As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ...As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.展开更多
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in...The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.展开更多
With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex...With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex.Users’actual demand for resources on the network application platform is closely related to their historical behavior records.Therefore,it is very important to analyze the user behavior path conversion rate.Therefore,this paper analyses and studies user behavior path based on sales data.Through analyzing the user quality of the website as well as the user’s repurchase rate,repurchase rate and retention rate in the website,we can get some user habits and use the data to guide the website optimization.展开更多
Wuthering Heights was an extraordinary novel in the nineteenth century,for it is very different from other contemporary novels which are reconciled with the public opinion by presenting Victorian values and tastes.It ...Wuthering Heights was an extraordinary novel in the nineteenth century,for it is very different from other contemporary novels which are reconciled with the public opinion by presenting Victorian values and tastes.It depicts a story of strong love and extreme hatred.This paper used the game theory to analyse the behaviors of Heathcliff in the Wuthering Heights.Some basic strategies and game models were used to illustrate the choices of the characters.This paper can be divided into four parts.The introduction is to introduce the novel,the description of the research approach and the definition of basic theories.It emphasizes on the introduction of basic strategies and some game models which would be used for the later analysis.The second part is to discuss the formation of Heathcliff's dual personality and analyses its causes.Heathcliff was very cruel in his revenge,but he also has a tender side in love,that is the manifestation of his dual personality.The formation of his dual personality dates back to his childhood suffering,the abnormal family environment,the pressure from long labor and finally his only love—Catherine's betrayal.The third part focuses on discussing how his dual personality affects Heathcliff's choices in the game plays with others.His tender personality affected Heathcliff's choice when facing Catherine's betrayal.He could not choose a grim strategy to totally break up with her,but choose a Tit for Tat and to combine with her after a revenge.His cruel personality made him harm other people indifferently which hide the foreshadowing for his death.The conclusion summarizes the arguments of this paper.This paper analyses from the formation of Heathcliff's dual personality,and then analyzes how his dual personality affected his choices in the game plays with others.展开更多
With a Critical Discourse Analysis approach, this essay reveals four types of discourses: discourse of examination, instruction, technology and regulation. Based on the analysis of power relation among those discourse...With a Critical Discourse Analysis approach, this essay reveals four types of discourses: discourse of examination, instruction, technology and regulation. Based on the analysis of power relation among those discourses, a vivid picture of teachers' identity at training-school has been clearly sketched. That is, teacher at training-school is a puppet acting as not only the transmitter of specific knowledge, but also the supervisor of rules and spokesman of institution.展开更多
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a...Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.展开更多
Pronunciation is the basic of learning a language and an important breakthrough point to promote the whole level of language.As a result,pronunciation attracted more and more attention in English teaching.However,it i...Pronunciation is the basic of learning a language and an important breakthrough point to promote the whole level of language.As a result,pronunciation attracted more and more attention in English teaching.However,it is still a weakness in English teaching because of the multifarious and complicated factors.A large numbers of research papers indicate that teacher is the leader and organizer of teaching activities,he or she dominants the whole process of pronunciation teaching.For example,they make decisions,design and reform the content of teaching in the classroom.What's more,teacher's beliefs can influence their teaching behaviors more than their professional knowledge,namely,teacher's phonetic teaching beliefs influence their phonetic teaching behaviors deeply.This study aims at finding out about teachers'beliefs of phonetic teaching and casting some light on the relationship between teachers' phonetic teaching beliefs and behaviors,and the causes for their inconsistency if any.展开更多
The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map show...The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented.展开更多
One of the main purposes for which people use Twitter is to share emotions with others. Users can easily post a message as a short text when they experience emotions such as pleasure or sadness. Such tweet serves to a...One of the main purposes for which people use Twitter is to share emotions with others. Users can easily post a message as a short text when they experience emotions such as pleasure or sadness. Such tweet serves to acquire empathy from followers, and can possibly influence others' emotions. In this study, we analyze the influence of emotional behaviors to user relationships based on Twitter data using two dictionaries of emotional words. Emotion scores are calculated via keyword matching. Moreover, we design three experiments with different settings: calculate the average emotion score of a user with random sampling, calculate the average emotion score using all emotional tweets, and calculate the average emotion score using emotional tweets, excluding users of few emotional tweets. We evaluate the influence of emotional behaviors to user relationships through the Brunner-Munzel test. The result shows that a positive user is more active than a negative user in constructing user relationships in a specific condition.展开更多
为了解决软件定义网络(software defined networking,SDN)架构面临的安全挑战,针对SDN网络架构中的安全审计环节,将传统网络中的安全审计解决方案与SDN网络集中控制的特性相结合,依托Floodlight控制器设计并实现适用于SDN网络环境的安...为了解决软件定义网络(software defined networking,SDN)架构面临的安全挑战,针对SDN网络架构中的安全审计环节,将传统网络中的安全审计解决方案与SDN网络集中控制的特性相结合,依托Floodlight控制器设计并实现适用于SDN网络环境的安全审计系统,包括安全审计事件的收集、分析、存储、响应等功能.提出一种针对分布式拒绝服务(distributed denial of service,DDo S)攻击的攻击回溯算法对安全审计事件进行追溯,确定出DDo S攻击发起者及僵尸主机集合.同时,采用滑动窗口分割算法从安全审计事件中提取出用户行为序列模式,基于Levenshtein算法计算用户行为序列模式之间的相似度,并根据用户当前行为和历史行为的相似度来判断是否出现可疑的攻击行为.经实验验证,该系统能准确地回溯出DDo S攻击发生时被控的僵尸主机集合及攻击者,并且可以有效地检测出用户攻击行为.展开更多
该系统是基于ASP.NET技术,采用Microsoft SQL Server 2012数据库,以微软的.NET平台作为系统的开发平台。分析了B2C电子商务管理系统的功能性需求、业务模型和非功能性需求。对B2C电子商务管理系统进行模块划分,将其划分为:用户行为分析...该系统是基于ASP.NET技术,采用Microsoft SQL Server 2012数据库,以微软的.NET平台作为系统的开发平台。分析了B2C电子商务管理系统的功能性需求、业务模型和非功能性需求。对B2C电子商务管理系统进行模块划分,将其划分为:用户行为分析、商品管理、订单管理、订单结算、系统管理五个功能模块。给出了各功能模块的结构图、核心处理流程图和主要功能的处理时序图。对数据库进行了设计,设计了该B2C电子商务管理系统的E-R图。最后,进行了各模块的主要操作界面的实现。展开更多
文摘As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.
基金sponsored by the National Natural Science Foundation of China under grant number No.61100008,61201084the China Postdoctoral Science Foundation under Grant No.2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund(Postdoctoral Youth Talent Program)under Grant No.LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No.LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No.QC2015076The Fundamental Research Funds for the Central Universities of China under grant number HEUCF100602
文摘The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.
基金funded by the Open Foundation for the University Innovation Platform in the Hunan Province,grant number 18K103Open project,Grant Number 20181901CRP03,20181901CRP04,20181901CRP05+1 种基金Hunan Provincial Education Science 13th Five-Year Plan(Grant No.XJK016BXX001),Social Science Foundation of Hunan Province(Grant No.17YBA049)supported by the project 18K103。
文摘With the rapid development of science and technology and the increasing popularity of the Internet,the number of network users is gradually expanding,and the behavior of network users is becoming more and more complex.Users’actual demand for resources on the network application platform is closely related to their historical behavior records.Therefore,it is very important to analyze the user behavior path conversion rate.Therefore,this paper analyses and studies user behavior path based on sales data.Through analyzing the user quality of the website as well as the user’s repurchase rate,repurchase rate and retention rate in the website,we can get some user habits and use the data to guide the website optimization.
文摘Wuthering Heights was an extraordinary novel in the nineteenth century,for it is very different from other contemporary novels which are reconciled with the public opinion by presenting Victorian values and tastes.It depicts a story of strong love and extreme hatred.This paper used the game theory to analyse the behaviors of Heathcliff in the Wuthering Heights.Some basic strategies and game models were used to illustrate the choices of the characters.This paper can be divided into four parts.The introduction is to introduce the novel,the description of the research approach and the definition of basic theories.It emphasizes on the introduction of basic strategies and some game models which would be used for the later analysis.The second part is to discuss the formation of Heathcliff's dual personality and analyses its causes.Heathcliff was very cruel in his revenge,but he also has a tender side in love,that is the manifestation of his dual personality.The formation of his dual personality dates back to his childhood suffering,the abnormal family environment,the pressure from long labor and finally his only love—Catherine's betrayal.The third part focuses on discussing how his dual personality affects Heathcliff's choices in the game plays with others.His tender personality affected Heathcliff's choice when facing Catherine's betrayal.He could not choose a grim strategy to totally break up with her,but choose a Tit for Tat and to combine with her after a revenge.His cruel personality made him harm other people indifferently which hide the foreshadowing for his death.The conclusion summarizes the arguments of this paper.This paper analyses from the formation of Heathcliff's dual personality,and then analyzes how his dual personality affected his choices in the game plays with others.
文摘With a Critical Discourse Analysis approach, this essay reveals four types of discourses: discourse of examination, instruction, technology and regulation. Based on the analysis of power relation among those discourses, a vivid picture of teachers' identity at training-school has been clearly sketched. That is, teacher at training-school is a puppet acting as not only the transmitter of specific knowledge, but also the supervisor of rules and spokesman of institution.
基金supported by the National Natural Science Foundation of China(Grant No.:71203163)the Foundation for Humanities and Social Sciences of the Chinese Ministry of Education(Grant No.:12YJC870011)
文摘Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.
文摘Pronunciation is the basic of learning a language and an important breakthrough point to promote the whole level of language.As a result,pronunciation attracted more and more attention in English teaching.However,it is still a weakness in English teaching because of the multifarious and complicated factors.A large numbers of research papers indicate that teacher is the leader and organizer of teaching activities,he or she dominants the whole process of pronunciation teaching.For example,they make decisions,design and reform the content of teaching in the classroom.What's more,teacher's beliefs can influence their teaching behaviors more than their professional knowledge,namely,teacher's phonetic teaching beliefs influence their phonetic teaching behaviors deeply.This study aims at finding out about teachers'beliefs of phonetic teaching and casting some light on the relationship between teachers' phonetic teaching beliefs and behaviors,and the causes for their inconsistency if any.
文摘The article tries to discover the major authors in the field of information seeking behavior via social network analysis. It is to be accomplished through a literature review and also by focusing on a graphic map showing the seven most productive coauthors in this field. Based on these seven authors' work, five probable research directions about information seeking behavior are discerned and presented.
文摘One of the main purposes for which people use Twitter is to share emotions with others. Users can easily post a message as a short text when they experience emotions such as pleasure or sadness. Such tweet serves to acquire empathy from followers, and can possibly influence others' emotions. In this study, we analyze the influence of emotional behaviors to user relationships based on Twitter data using two dictionaries of emotional words. Emotion scores are calculated via keyword matching. Moreover, we design three experiments with different settings: calculate the average emotion score of a user with random sampling, calculate the average emotion score using all emotional tweets, and calculate the average emotion score using emotional tweets, excluding users of few emotional tweets. We evaluate the influence of emotional behaviors to user relationships through the Brunner-Munzel test. The result shows that a positive user is more active than a negative user in constructing user relationships in a specific condition.
文摘为了解决软件定义网络(software defined networking,SDN)架构面临的安全挑战,针对SDN网络架构中的安全审计环节,将传统网络中的安全审计解决方案与SDN网络集中控制的特性相结合,依托Floodlight控制器设计并实现适用于SDN网络环境的安全审计系统,包括安全审计事件的收集、分析、存储、响应等功能.提出一种针对分布式拒绝服务(distributed denial of service,DDo S)攻击的攻击回溯算法对安全审计事件进行追溯,确定出DDo S攻击发起者及僵尸主机集合.同时,采用滑动窗口分割算法从安全审计事件中提取出用户行为序列模式,基于Levenshtein算法计算用户行为序列模式之间的相似度,并根据用户当前行为和历史行为的相似度来判断是否出现可疑的攻击行为.经实验验证,该系统能准确地回溯出DDo S攻击发生时被控的僵尸主机集合及攻击者,并且可以有效地检测出用户攻击行为.
文摘该系统是基于ASP.NET技术,采用Microsoft SQL Server 2012数据库,以微软的.NET平台作为系统的开发平台。分析了B2C电子商务管理系统的功能性需求、业务模型和非功能性需求。对B2C电子商务管理系统进行模块划分,将其划分为:用户行为分析、商品管理、订单管理、订单结算、系统管理五个功能模块。给出了各功能模块的结构图、核心处理流程图和主要功能的处理时序图。对数据库进行了设计,设计了该B2C电子商务管理系统的E-R图。最后,进行了各模块的主要操作界面的实现。