893 resultados para dynamic user behavior
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
Resumo:
In this thesis, tool support is addressed for the combined disciplines of Model-based testing and performance testing. Model-based testing (MBT) utilizes abstract behavioral models to automate test generation, thus decreasing time and cost of test creation. MBT is a functional testing technique, thereby focusing on output, behavior, and functionality. Performance testing, however, is non-functional and is concerned with responsiveness and stability under various load conditions. MBPeT (Model-Based Performance evaluation Tool) is one such tool which utilizes probabilistic models, representing dynamic real-world user behavior patterns, to generate synthetic workload against a System Under Test and in turn carry out performance analysis based on key performance indicators (KPI). Developed at Åbo Akademi University, the MBPeT tool is currently comprised of a downloadable command-line based tool as well as a graphical user interface. The goal of this thesis project is two-fold: 1) to extend the existing MBPeT tool by deploying it as a web-based application, thereby removing the requirement of local installation, and 2) to design a user interface for this web application which will add new user interaction paradigms to the existing feature set of the tool. All phases of the MBPeT process will be realized via this single web deployment location including probabilistic model creation, test configurations, test session execution against a SUT with real-time monitoring of user configurable metric, and final test report generation and display. This web application (MBPeT Dashboard) is implemented with the Java programming language on top of the Vaadin framework for rich internet application development. The Vaadin framework handles the complicated web communications processes and front-end technologies, freeing developers to implement the business logic as well as the user interface in pure Java. A number of experiments are run in a case study environment to validate the functionality of the newly developed Dashboard application as well as the scalability of the solution implemented in handling multiple concurrent users. The results support a successful solution with regards to the functional and performance criteria defined, while improvements and optimizations are suggested to increase both of these factors.
Resumo:
This study contributes to the growth of design knowledge in China, where vehicle design for the local, older user is in its initial developmental stages. Therefore, this research has explored the travel needs of older Chinese vehicle users in order to assist designers to better understand users’ current and future needs. A triangulation method consisting of interviews, logbook and co-discovery was used to collect multiple forms of data and so explore the research question. Grounded theory has been employed to analyze the research data. This study found that users’ needs are reflected through various ‘meanings’ that they attach to vehicles – meanings that give a tangible expression to their experiences. This study identified six older-user need categories: (i) safety, (ii) utility, (iii) comfort, (iv) identity, (v) emotion and (vi) spirituality. The interrelationships among these six categories are seen as an interactive structure, rather than as a linear or hierarchical arrangement. Chinese cultural values, which are generated from particular local context and users’ social practice, will play a dynamic role in linking and shaping the travel needs of older vehicle users in the future. Moreover, this study structures the older-user needs model into three levels of meaning, to give guidance to vehicle design direction: (i) the practical meaning level, (ii) the social meaning level and (ii) the cultural meaning level. This study suggests that a more comprehensive explanation exists if designers can identify the vehicle’s meaning and property associated with the fulfilled older users’ needs. However, these needs will vary, and must be related to particular technological, social, and cultural contexts. The significance of this study lies in its contributions to the body of knowledge in three areas: research methodology, theory and design. These theoretical contributions provide a series of methodological tools, models and approaches from a vehicle design perspective. These include a conditional/consequential matrix, a travel needs identification model, an older users’ travel-related needs framework, a user information structure model, and an Older-User-Need-Based vehicle design approach. These models suggest a basic framework for the new design process which might assist in the design of new vehicles to fulfil the needs of future, aging Chinese generations. The models have the potential to be transferred to other design domains and different cultural contexts.
Resumo:
Query reformulation is a key user behavior during Web search. Our research goal is to develop predictive models of query reformulation during Web searching. This article reports results from a study in which we automatically classified the query-reformulation patterns for 964,780 Web searching sessions, composed of 1,523,072 queries, to predict the next query reformulation. We employed an n-gram modeling approach to describe the probability of users transitioning from one query-reformulation state to another to predict their next state. We developed first-, second-, third-, and fourth-order models and evaluated each model for accuracy of prediction, coverage of the dataset, and complexity of the possible pattern set. The results show that Reformulation and Assistance account for approximately 45% of all query reformulations; furthermore, the results demonstrate that the first- and second-order models provide the best predictability, between 28 and 40% overall and higher than 70% for some patterns. Implications are that the n-gram approach can be used for improving searching systems and searching assistance.
Resumo:
Stigmergy is a biological term used when discussing insect or swarm behaviour, and describes a model supporting environmental communication separately from artefacts or agents. This phenomenon is demonstrated in the behavior of ants and their food gathering process when following pheromone trails, or similarly termites and their termite mound building process. What is interesting with this mechanism is that highly organized societies are achieved with a lack of any apparent management structure. Stigmergic behavior is implicit in the Web where the volume of users provides a self-organizing and self-contextualization of content in sites which facilitate collaboration. However, the majority of content is generated by a minority of the Web participants. A significant contribution from this research would be to create a model of Web stigmergy, identifying virtual pheromones and their importance in the collaborative process. This paper explores how exploiting stigmergy has the potential of providing a valuable mechanism for identifying and analyzing online user behavior recording actionable knowledge otherwise lost in the existing web interaction dynamics. Ultimately this might assist our building better collaborative Web sites.
Resumo:
Building Web 2.0 sites does not necessarily ensure the success of the site. We aim to better understand what improves the success of a site by drawing insight from biologically inspired design patterns. Web 2.0 sites provide a mechanism for human interaction enabling powerful intercommunication between massive volumes of users. Early Web 2.0 site providers that were previously dominant are being succeeded by newer sites providing innovative social interaction mechanisms. Understanding what site traits contribute to this success drives research into Web sites mechanics using models to describe the associated social networking behaviour. Some of these models attempt to show how the volume of users provides a self-organising and self-contextualisation of content. One model describing coordinated environments is called stigmergy, a term originally describing coordinated insect behavior. This paper explores how exploiting stigmergy can provide a valuable mechanism for identifying and analysing online user behavior specifically when considering that user freedom of choice is restricted by the provided web site functionality. This will aid our building better collaborative Web sites improving the collaborative processes.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
News blog hot topics are important for the information recommendation service and marketing. However, information overload and personalized management make the information arrangement more difficult. Moreover, what influences the formation and development of blog hot topics is seldom paid attention to. In order to correctly detect news blog hot topics, the paper first analyzes the development of topics in a new perspective based on W2T (Wisdom Web of Things) methodology. Namely, the characteristics of blog users, context of topic propagation and information granularity are unified to analyze the related problems. Some factors such as the user behavior pattern, network opinion and opinion leader are subsequently identified to be important for the development of topics. Then the topic model based on the view of event reports is constructed. At last, hot topics are identified by the duration, topic novelty, degree of topic growth and degree of user attention. The experimental results show that the proposed method is feasible and effective.
Resumo:
Although topic detection and tracking techniques have made great progress, most of the researchers seldom pay more attention to the following two aspects. First, the construction of a topic model does not take the characteristics of different topics into consideration. Second, the factors that determine the formation and development of hot topics are not further analyzed. In order to correctly extract news blog hot topics, the paper views the above problems in a new perspective based on the W2T (Wisdom Web of Things) methodology, in which the characteristics of blog users, context of topic propagation and information granularity are investigated in a unified way. The motivations and features of blog users are first analyzed to understand the characteristics of news blog topics. Then the context of topic propagation is decomposed into the blog community, topic network and opinion network, respectively. Some important factors such as the user behavior pattern, opinion leader and network opinion are identified to track the development trends of news blog topics. Moreover, a blog hot topic detection algorithm is proposed, in which news blog hot topics are identified by measuring the duration, topic novelty, attention degree of users and topic growth. Experimental results show that the proposed method is feasible and effective. These results are also useful for further studying the formation mechanism of opinion leaders in blogspace.
Resumo:
Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.
Resumo:
This study investigates whether an Australian city’s suburbs having high transit Quality of Service (QoS) are associated with higher transit ridership than those having low transit QoS •We explore how QoS measures including service frequency, service span, service coverage, and travel time ratio, along with implicit environmental predictors such as topographic grade factor influence bus ridership •We applied Multiple Linear Regression (MLR) to examine the relationship between QoS and ridership •Its outcomes enhance our understanding of transit user behavior, which is informative to urban transportation policy, planning, and provision
Resumo:
This paper studies an ultrasonic wave dispersion characteristics of a nanorod. Nonlocal strain gradient models (both second and fourth order) are introduced to analyze the ultrasonic wave behavior in nanorod. Explicit expressions are derived for wave numbers and the wave speeds of the nanorod. The analysis shows that the fourth order strain gradient model gives approximate results over the second order strain gradient model for dynamic analysis. The second order strain gradient model gives a critical wave number at certain wave frequency, where the wave speeds are zero. A relation among the number of waves along the nanorod, the nonlocal scaling parameter (e(0)a), and the length of the nanorod is obtained from the nonlocal second order strain gradient model. The ultrasonic wave characteristics of the nanorod obtained from the nonlocal strain gradient models are compared with the classical continuum model. The dynamic response behavior of nanorods is explained from both the strain gradient models. The effect of e(0)a on the ultrasonic wave behavior of the nanorods is also observed. (C) 2010 American Institute of Physics.
Resumo:
Uniaxial compression tests were conducted on Ti-6Al-4V specimens in the strain-rate range df 0.001 to 1 s(-1) and temperature range of 298 to 673 K. The stress-strain curves exhibited a peak flow stress followed by flow softening. Up to 523 K, the specimens cracked catastrophically after the flow softening started. Adiabatic shear banding was observed in this regime. The fracture surface exhibited both mode I and II fracture features. The state of stress existing in a compression test specimen when bulging occurs is responsible for this fracture. The instabilities observed in the present tests are classified as ''geometric'' in nature and are state-of-stress dependant, unlike the ''intrinsic'' instabilities, which are dependant on the dynamic constitutive behavior of the material.
Resumo:
Frequent episode discovery is a popular framework for pattern discovery from sequential data. It has found many applications in domains like alarm management in telecommunication networks, fault analysis in the manufacturing plants, predicting user behavior in web click streams and so on. In this paper, we address the discovery of serial episodes. In the episodes context, there have been multiple ways to quantify the frequency of an episode. Most of the current algorithms for episode discovery under various frequencies are apriori-based level-wise methods. These methods essentially perform a breadth-first search of the pattern space. However currently there are no depth-first based methods of pattern discovery in the frequent episode framework under many of the frequency definitions. In this paper, we try to bridge this gap. We provide new depth-first based algorithms for serial episode discovery under non-overlapped and total frequencies. Under non-overlapped frequency, we present algorithms that can take care of span constraint and gap constraint on episode occurrences. Under total frequency we present an algorithm that can handle span constraint. We provide proofs of correctness for the proposed algorithms. We demonstrate the effectiveness of the proposed algorithms by extensive simulations. We also give detailed run-time comparisons with the existing apriori-based methods and illustrate scenarios under which the proposed pattern-growth algorithms perform better than their apriori counterparts. (C) 2013 Elsevier B.V. All rights reserved.
Resumo:
The present work explores the potential of semi-solid heat treatment technique by elucidating its effect on the plastic behavior of 304L SS in hot working domain. To accomplish this objective, hot isothermal compression tests on 304L SS specimens with semi-solid heat treatment and conventional annealing heat treatment have been carried out within a temperature range of 1273-1473 K and strain rates ranging from 0.01 to 1 s(-1). The dynamic flow behavior of this steel in its conventional heat-treated condition and semi-solid heat-treated condition has been characterized in terms of strain hardening, temperature softening, strain rate hardening, and dynamic flow softening. Extensive microstructural investigation has been carried out to corroborate the results obtained from the analysis of flow behavior. Detailed analysis of the results demonstrates that semi-solid heat treatment moderates work hardening, strain rate hardening, and temperature sensitivity of 304L SS, which is favorable for hot deformation. The post-deformation hardness values of semi-solid heat-treated steel and conventionally heat-treated steel were found to remain similar despite the pre-deformation heat treatment conditions. The results obtained demonstrate the potential of semi-solid heat treatment as a pre-deformation heat treatment step to effectively reduce the strength of the material to facilitate easier deformation without affecting the post-deformation properties of the steel.