期刊文献+
共找到589篇文章
< 1 2 30 >
每页显示 20 50 100
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
1
作者 Yuting Tan Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期463-473,共11页
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ... As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis. 展开更多
关键词 social Media user behavior analysis sentiment analysis Data Mining Machine Learning user Profiling CYBERsECURITY behavioral Insights Personality Prediction
下载PDF
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
2
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL NETWORK social NETWORK analysis user behavior analysis KEYWORD selection
下载PDF
User Behavior Path Analysis Based on Sales Data
3
作者 Wangdong Jiang Dongling Zhang +3 位作者 Yapeng Peng Guang Sun Ying Cao Jing Li Hunan 《Journal of New Media》 2020年第2期79-90,共12页
With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex... With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex.Users’actual demand for resources on the network application platform is closely related to their historical behavior records.Therefore,it is very important to analyze the user behavior path conversion rate.Therefore,this paper analyses and studies user behavior path based on sales data.Through analyzing the user quality of the website as well as the user’s repurchase rate,repurchase rate and retention rate in the website,we can get some user habits and use the data to guide the website optimization. 展开更多
关键词 user behavior Path analysis VIsUALIZATION conversion rate
下载PDF
Game Analysis on Heathcliff's Behaviors in the Wuthering Heights
4
作者 李晓松 《海外英语》 2013年第23期222-225,共4页
Wuthering Heights was an extraordinary novel in the nineteenth century,for it is very different from other contemporary novels which are reconciled with the public opinion by presenting Victorian values and tastes.It ... Wuthering Heights was an extraordinary novel in the nineteenth century,for it is very different from other contemporary novels which are reconciled with the public opinion by presenting Victorian values and tastes.It depicts a story of strong love and extreme hatred.This paper used the game theory to analyse the behaviors of Heathcliff in the Wuthering Heights.Some basic strategies and game models were used to illustrate the choices of the characters.This paper can be divided into four parts.The introduction is to introduce the novel,the description of the research approach and the definition of basic theories.It emphasizes on the introduction of basic strategies and some game models which would be used for the later analysis.The second part is to discuss the formation of Heathcliff's dual personality and analyses its causes.Heathcliff was very cruel in his revenge,but he also has a tender side in love,that is the manifestation of his dual personality.The formation of his dual personality dates back to his childhood suffering,the abnormal family environment,the pressure from long labor and finally his only love—Catherine's betrayal.The third part focuses on discussing how his dual personality affects Heathcliff's choices in the game plays with others.His tender personality affected Heathcliff's choice when facing Catherine's betrayal.He could not choose a grim strategy to totally break up with her,but choose a Tit for Tat and to combine with her after a revenge.His cruel personality made him harm other people indifferently which hide the foreshadowing for his death.The conclusion summarizes the arguments of this paper.This paper analyses from the formation of Heathcliff's dual personality,and then analyzes how his dual personality affected his choices in the game plays with others. 展开更多
关键词 GAME analysis Heathcliff’s behaviors
下载PDF
A Critical Discourse Analysis on the Teacher Behavioral Norms of English Training School
5
作者 TONG Xiao-wan 《海外英语》 2015年第4期120-122,共3页
With a Critical Discourse Analysis approach, this essay reveals four types of discourses: discourse of examination, instruction, technology and regulation. Based on the analysis of power relation among those discourse... With a Critical Discourse Analysis approach, this essay reveals four types of discourses: discourse of examination, instruction, technology and regulation. Based on the analysis of power relation among those discourses, a vivid picture of teachers' identity at training-school has been clearly sketched. That is, teacher at training-school is a puppet acting as not only the transmitter of specific knowledge, but also the supervisor of rules and spokesman of institution. 展开更多
关键词 teacher’s identity power relation Critical DIsCOURsE analysis TEACHER behaviorAL norms English training sCHOOL
下载PDF
Exploring users' within-site navigation behavior:A case study based on clickstream data 被引量:1
6
作者 Tingting JIANG Yu CHI Wenrui JIA 《Chinese Journal of Library and Information Science》 2014年第4期63-76,共14页
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a... Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior. 展开更多
关键词 Web navigation user behavior Clickstream data analysis Metrics Resale apartment website
下载PDF
基于SEM模型的新能源网约车用户充电行为关联因素分析 被引量:1
7
作者 杨琰 殷玮川 +1 位作者 孙连英 隋宗智 《北京交通大学学报》 CAS CSCD 北大核心 2024年第3期39-47,共9页
针对新能源网约车用户的充电行为与个人属性、车辆属性、用户满意度等多重因素之间的复杂互动问题,运用结构方程模型(Structural Equation Modeling,SEM)详细探究各定量因素之间的影响作用,并采用关联规则挖掘技术结合定类数据和定量数... 针对新能源网约车用户的充电行为与个人属性、车辆属性、用户满意度等多重因素之间的复杂互动问题,运用结构方程模型(Structural Equation Modeling,SEM)详细探究各定量因素之间的影响作用,并采用关联规则挖掘技术结合定类数据和定量数据分析405份样本,得到用户与充电行为相关决策的具体表现形式.研究结果表明:每增加40 km的行驶里程,充电次数将平均增加0.407次;用户个人和车辆的属性反映出不同群体的充电决策差异,路径系数分别为0.336、0.159;排队时间阈值每增加1个单位,到站时间阈值平均增加0.231个单位,说明不同场景下用户可接受的时间阈值具有一致性,通过提供针对性服务可以满足不同用户的需求;新能源网约车的预估里程准确度与用户对充电设施的满意度正相关,正相关结果的统计显著性水平P值为0.273,反映了准确预估里程能力在促进新能源网约车普及中的重要性;用户对价格和服务的多样性说明市场的灵活定价机制具有潜在价值;时间和金钱在决策中的复杂权衡,反映了行为背后的复杂性和多元性.这些结果揭示了不同因素之间的复杂关联,为未来相关领域的研究提供了理论基础和实证依据. 展开更多
关键词 交通工程 用户充电行为 行为分析 结构方程模型 新能源网约车
下载PDF
Brief Probe into College English Teachers' Phonetic Teaching Beliefs and Behavior
8
作者 王云虹 《海外英语》 2010年第7X期89-90,92,共3页
Pronunciation is the basic of learning a language and an important breakthrough point to promote the whole level of language.As a result,pronunciation attracted more and more attention in English teaching.However,it i... Pronunciation is the basic of learning a language and an important breakthrough point to promote the whole level of language.As a result,pronunciation attracted more and more attention in English teaching.However,it is still a weakness in English teaching because of the multifarious and complicated factors.A large numbers of research papers indicate that teacher is the leader and organizer of teaching activities,he or she dominants the whole process of pronunciation teaching.For example,they make decisions,design and reform the content of teaching in the classroom.What's more,teacher's beliefs can influence their teaching behaviors more than their professional knowledge,namely,teacher's phonetic teaching beliefs influence their phonetic teaching behaviors deeply.This study aims at finding out about teachers'beliefs of phonetic teaching and casting some light on the relationship between teachers' phonetic teaching beliefs and behaviors,and the causes for their inconsistency if any. 展开更多
关键词 PHONETIC teaching teacher’s BELIEFs teachersbehaviors COMPARATIVE analysis
下载PDF
Introduction to information seeking behavior—A review of literature and field practice directions
9
作者 Li-Ping KU 《Chinese Journal of Library and Information Science》 2010年第1期65-78,共14页
The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map show... The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented. 展开更多
关键词 social network analysis Library and information science database Information seeking behavior user behavior
下载PDF
基于人脸识别的课堂教学行为S-T分析系统设计
10
作者 韦雁仙 李霖 段宁贵 《梧州学院学报》 2024年第3期36-45,共10页
提出并详细介绍了一种基于人脸识别技术的课堂教学行为S-T分析系统的设计。该系统以S-T分析法为理论基础,采用多种人脸识别算法,包括年龄检测、表情分析、姿态分析等,旨在自动识别并分析教师和学生在课堂上的行为。基于大量课堂视频数... 提出并详细介绍了一种基于人脸识别技术的课堂教学行为S-T分析系统的设计。该系统以S-T分析法为理论基础,采用多种人脸识别算法,包括年龄检测、表情分析、姿态分析等,旨在自动识别并分析教师和学生在课堂上的行为。基于大量课堂视频数据的准备、软件系统原型的设计、深入研究课堂教学行为理论等,解决人脸识别技术的算法选型、视频关键帧的分析与因果关系模型的建立、系统运行的稳定性和界面设计等关键技术问题。通过系统性的需求分析、设计与架构、实现、评估与可视化等阶段的论述,详细展现了该系统的开发过程。 展开更多
关键词 课堂教学行为 s-T分析法 人脸识别技术 关键帧
下载PDF
基于UBmap/AHP/FAST的医院建筑火灾应急避难装置设计
11
作者 关凯元 周超 +1 位作者 吕姊宸 靳月鑫 《中国安全科学学报》 CAS CSCD 北大核心 2024年第7期202-210,共9页
为提高医院火灾应急避难能力,针对医院住院楼建筑,设计一款在火灾下能及时进行应急避难、安全逃脱的装置产品。集合用户行为地图(UBmap)、层次分析法(AHP)、功能分析系统技术法(FAST),融入整体设计构架中,探究应急避难装置产品的用户需... 为提高医院火灾应急避难能力,针对医院住院楼建筑,设计一款在火灾下能及时进行应急避难、安全逃脱的装置产品。集合用户行为地图(UBmap)、层次分析法(AHP)、功能分析系统技术法(FAST),融入整体设计构架中,探究应急避难装置产品的用户需求以及相关产品设计要素。将医院住院楼建筑环境特点及患者人群对火灾的逃生行为过程融入UBmap中,构建行为旅程图,推测并提取各个阶段需求指标;再通过AHP/FAST聚合方法,对需求指标进行重要度排序,并转化为主次功能进行分析求解,以此推断产品设计定位与功能逻辑的准确性,完成设计方案生产。综合UBmap/AHP/FAST为依据的理论模型,运用到医院住院楼建筑火灾下的避难装置设计开发流程中,并运用ANSYS Workbench软件有限元分析方案,进一步验证校核该设计的整体装置强度与可行性。结果表明:将不同的方法融合分析,系统性地对产品展开分析设计与实现且进行仿真检验,减少设计过程中的薄弱环节与不确定性问题,能够使设计更具系统性与科学性,达到降低避难装置的生产成本、实现安全效率化、防灾减灾的目标。 展开更多
关键词 用户行为地图(UBmap) 层次分析法(AHP) 功能分析系统(FAsT) 建筑火灾 应急避难装置 装置设计
下载PDF
Influence Analysis of Emotional Behaviors and User Relationships Based on Twitter Data 被引量:5
12
作者 Kiichi Tago Qun Jin 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第1期104-113,共10页
One of the main purposes for which people use Twitter is to share emotions with others. Users can easily post a message as a short text when they experience emotions such as pleasure or sadness. Such tweet serves to a... One of the main purposes for which people use Twitter is to share emotions with others. Users can easily post a message as a short text when they experience emotions such as pleasure or sadness. Such tweet serves to acquire empathy from followers, and can possibly influence others' emotions. In this study, we analyze the influence of emotional behaviors to user relationships based on Twitter data using two dictionaries of emotional words. Emotion scores are calculated via keyword matching. Moreover, we design three experiments with different settings: calculate the average emotion score of a user with random sampling, calculate the average emotion score using all emotional tweets, and calculate the average emotion score using emotional tweets, excluding users of few emotional tweets. We evaluate the influence of emotional behaviors to user relationships through the Brunner-Munzel test. The result shows that a positive user is more active than a negative user in constructing user relationships in a specific condition. 展开更多
关键词 TWITTER social data analysis emotional behavior user relationship Brunner-Munzel test
原文传递
基于迁移学习和D-S理论的网络异常检测 被引量:21
13
作者 赵新杰 刘渊 孙剑 《计算机应用研究》 CSCD 北大核心 2016年第4期1137-1140,共4页
对于分布不同或分布相似的未知类型的网络攻击,目前的异常检测技术往往不能达到预期的效果。针对上述问题,研究了一种基于迁移技术和D-S证据理论的网络异常检测方法。首先用迁移学习方法对已知网络攻击进行建模,此模型在构建时考虑了不... 对于分布不同或分布相似的未知类型的网络攻击,目前的异常检测技术往往不能达到预期的效果。针对上述问题,研究了一种基于迁移技术和D-S证据理论的网络异常检测方法。首先用迁移学习方法对已知网络攻击进行建模,此模型在构建时考虑了不同分布的异常攻击间的差异;然后用其训练得到的分类器对未知的网络行为进行分析,结合D-S证据理论,可以检测出分布不一致的未知攻击类型。实验结果表明,该方法泛化了传统的网络异常检测技术,对未知的网络异常有着较高的检测率。 展开更多
关键词 迁移学习 D-s理论 异常行为分析 数据融合
下载PDF
SinoMed用户检索行为分析 被引量:4
14
作者 张宁 马豪 张明 《医学信息学杂志》 CAS 2010年第5期25-27,40,共4页
中国生物医学文献服务系统(SinoMed)是在《中国生物医学文献数据库》(CBM)的基础上开发研制的新一代专业文献信息服务系统。以SinoMed现有用户为主要调查对象,从用户检索需求、检索行为和检索效果几方面展开调查,旨在及时掌握用户的需... 中国生物医学文献服务系统(SinoMed)是在《中国生物医学文献数据库》(CBM)的基础上开发研制的新一代专业文献信息服务系统。以SinoMed现有用户为主要调查对象,从用户检索需求、检索行为和检索效果几方面展开调查,旨在及时掌握用户的需求变化,为SinoMed系统的功能完善及未来发展提供参考依据。 展开更多
关键词 sinoMed 检索行为分析 用户调查
下载PDF
基于D-S证据理论的地下洞室作业人员安全行为评价 被引量:8
15
作者 郑霞忠 石法起 +2 位作者 陈述 刘晶 吴黎明 《中国安全生产科学技术》 CAS CSCD 北大核心 2016年第6期158-162,共5页
为系统地评价地下洞室作业人员安全行为水平,综合运用集对分析和D-S证据理论,提出一种基于D-S证据理论的作业人员安全行为评价方法。首先,分析了影响作业人员安全行为的因素,构建包括作业人员安全素养、生理因素、心理因素、作业技术等... 为系统地评价地下洞室作业人员安全行为水平,综合运用集对分析和D-S证据理论,提出一种基于D-S证据理论的作业人员安全行为评价方法。首先,分析了影响作业人员安全行为的因素,构建包括作业人员安全素养、生理因素、心理因素、作业技术等4个一级指标及16个二级指标的综合评价指标体系,并将安全行为等级划分为4级;其次,采用集对分析处理二级指标的不确定性,产生基本信度分配函数(BPA);然后,利用D-S证据理论,融合一级指标的BPA,产生最终安全等级隶属度;最后,结合最大隶属度原则和信任准则,确定地下洞室作业人员安全行为等级。以某水电站引水隧洞开挖工程为例,确定该工程中作业人员行为安全等级为z2级,即一般安全,符合工程实际。 展开更多
关键词 安全行为 地下洞室 D-s证据理论 集对分析 作业人员
下载PDF
基于多视角二分k-means的高校图书馆用户画像研究 被引量:10
16
作者 李伟 胡云飞 李澎林 《浙江工业大学学报》 CAS 北大核心 2020年第2期141-147,共7页
针对高校图书馆无法实现精准读者推荐和服务的问题,在充分分析读者在图书馆的行为数据基础上,设计了一种基于多视角聚类的高校图书馆用户画像框架。考虑到经典k-means算法在多视角聚类中存在容易陷入局部最优的缺陷,提出了一种基于马氏... 针对高校图书馆无法实现精准读者推荐和服务的问题,在充分分析读者在图书馆的行为数据基础上,设计了一种基于多视角聚类的高校图书馆用户画像框架。考虑到经典k-means算法在多视角聚类中存在容易陷入局部最优的缺陷,提出了一种基于马氏距离的多视角二分k-means算法,该算法引入马氏距离有效地解决了欧式距离在多视角聚类中受属性量纲的影响。实验证明:相比经典k-means算法和二分k-means算法,改进后的算法在用户画像过程中全局最优、鲁棒性好、效率高;利用该框架得到的用户画像能够帮助高校图书馆挖掘读者需求、提高服务水平。 展开更多
关键词 数据挖掘 用户画像 行为分析 二分k-means算法
下载PDF
SDN架构下的安全审计系统研究与实现 被引量:2
17
作者 刘静 何运 赖英旭 《北京工业大学学报》 CAS CSCD 北大核心 2017年第2期180-191,共12页
为了解决软件定义网络(software defined networking,SDN)架构面临的安全挑战,针对SDN网络架构中的安全审计环节,将传统网络中的安全审计解决方案与SDN网络集中控制的特性相结合,依托Floodlight控制器设计并实现适用于SDN网络环境的安... 为了解决软件定义网络(software defined networking,SDN)架构面临的安全挑战,针对SDN网络架构中的安全审计环节,将传统网络中的安全审计解决方案与SDN网络集中控制的特性相结合,依托Floodlight控制器设计并实现适用于SDN网络环境的安全审计系统,包括安全审计事件的收集、分析、存储、响应等功能.提出一种针对分布式拒绝服务(distributed denial of service,DDo S)攻击的攻击回溯算法对安全审计事件进行追溯,确定出DDo S攻击发起者及僵尸主机集合.同时,采用滑动窗口分割算法从安全审计事件中提取出用户行为序列模式,基于Levenshtein算法计算用户行为序列模式之间的相似度,并根据用户当前行为和历史行为的相似度来判断是否出现可疑的攻击行为.经实验验证,该系统能准确地回溯出DDo S攻击发生时被控的僵尸主机集合及攻击者,并且可以有效地检测出用户攻击行为. 展开更多
关键词 软件定义网络(sDN) 安全审计 Floodlight 攻击回溯 用户行为分析
下载PDF
基于CK-means算法的用户用电负荷聚类分析 被引量:4
18
作者 程江洲 何艳 +1 位作者 鲍刚 潘飞 《计算机仿真》 北大核心 2021年第7期63-67,133,共6页
针对传统K-means算法存在的对初始聚类中心敏感和需要预先给定K值的问题,提出了一种基于CK-means算法的用户用电负荷聚类分析方法。先对负荷数据进行预处理,通过密度Canopy算法可得到最优簇集值K与最佳初始聚类中心,将其代入K-means算... 针对传统K-means算法存在的对初始聚类中心敏感和需要预先给定K值的问题,提出了一种基于CK-means算法的用户用电负荷聚类分析方法。先对负荷数据进行预处理,通过密度Canopy算法可得到最优簇集值K与最佳初始聚类中心,将其代入K-means算法中可提取出典型的用户负荷模式、得到具有差异性的聚类成员,选取江西某地216名用户一个月的负荷数据进行实例仿真,通过与两种典型的聚类方法进行比较,并用不同的有效性指标来评价其聚类性能,实验结果证明改进后的新算法在准确性、稳定性和有效性方面都优于其它算法。 展开更多
关键词 用电行为分析 用户分类 用电负荷
下载PDF
基于fsQCA的移动地图APP持续使用意愿影响因素研究 被引量:16
19
作者 甘春梅 邱智燕 徐维晞 《情报理论与实践》 CSSCI 北大核心 2020年第11期110-115,共6页
[目的/意义]基于模糊集定性比较分析(fsQCA),探讨不同维度的感知价值对移动地图APP持续使用意愿的影响,期望阐释不同价值维度组合的作用机理。[方法/过程]以感知价值为理论基础,将移动地图APP使用情境下的感知价值划分为便利价值、信息... [目的/意义]基于模糊集定性比较分析(fsQCA),探讨不同维度的感知价值对移动地图APP持续使用意愿的影响,期望阐释不同价值维度组合的作用机理。[方法/过程]以感知价值为理论基础,将移动地图APP使用情境下的感知价值划分为便利价值、信息价值和质量价值,构建移动地图APP持续使用意愿的理论模型。通过问卷收集448份有效样本,采用fsQCA进行数据分析。[结果/结论]结果显示,信息价值和质量价值是促进移动地图APP持续使用意愿的核心因素。 展开更多
关键词 移动地图APP 感知价值 模糊集定性比较分析 持续使用意愿 用户行为
下载PDF
基于BS结构的B2C电子商务管理系统设计与开发 被引量:6
20
作者 刘业峰 《沈阳工程学院学报(自然科学版)》 2017年第1期59-65,共7页
该系统是基于ASP.NET技术,采用Microsoft SQL Server 2012数据库,以微软的.NET平台作为系统的开发平台。分析了B2C电子商务管理系统的功能性需求、业务模型和非功能性需求。对B2C电子商务管理系统进行模块划分,将其划分为:用户行为分析... 该系统是基于ASP.NET技术,采用Microsoft SQL Server 2012数据库,以微软的.NET平台作为系统的开发平台。分析了B2C电子商务管理系统的功能性需求、业务模型和非功能性需求。对B2C电子商务管理系统进行模块划分,将其划分为:用户行为分析、商品管理、订单管理、订单结算、系统管理五个功能模块。给出了各功能模块的结构图、核心处理流程图和主要功能的处理时序图。对数据库进行了设计,设计了该B2C电子商务管理系统的E-R图。最后,进行了各模块的主要操作界面的实现。 展开更多
关键词 用户行为分析 电子商务 B2C 数据挖掘
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部