scholarly journals Generality Analysis Method of Research Papers Using User Behavior Data on the Internet

2020 ◽  
Vol 30 (3) ◽  
pp. 312-327
Author(s):  
Kazuhisa KOBAYASHI ◽  
Kazuhiro KAZAMA ◽  
Mitsuo YOSHIDA ◽  
Ikki OHMUKAI ◽  
Sho SATO
Author(s):  
Faxin Qi ◽  
Xiangrong Tong ◽  
Lei Yu ◽  
Yingjie Wang

AbstractWith the development of the Internet and the progress of human-centered computing (HCC), the mode of man-machine collaborative work has become more and more popular. Valuable information in the Internet, such as user behavior and social labels, is often provided by users. A recommendation based on trust is an important human-computer interaction recommendation application in a social network. However, previous studies generally assume that the trust value between users is static, unable to respond to the dynamic changes of user trust and preferences in a timely manner. In fact, after receiving the recommendation, there is a difference between actual evaluation and expected evaluation which is correlated with trust value. Based on the dynamics of trust and the changing process of trust between users, this paper proposes a trust boost method through reinforcement learning. Recursive least squares (RLS) algorithm is used to learn the dynamic impact of evaluation difference on user’s trust. In addition, a reinforcement learning method Deep Q-Learning (DQN) is studied to simulate the process of learning user’s preferences and boosting trust value. Experiments indicate that our method applied to recommendation systems could respond to the changes quickly on user’s preferences. Compared with other methods, our method has better accuracy on recommendation.


Author(s):  
Benard M. Maake ◽  
Sunday O. Ojo ◽  
Tranos Zuva

Research-related publications and articles have flooded the internet, and researchers are in the quest of getting better tools and technologies to improve the recommendation of relevant research papers. Ever since the introduction of research paper recommender systems, more than 400 research paper recommendation related articles have been so far published. These articles describe the numerous tools, methodologies, and technologies used in recommending research papers, further highlighting issues that need the attention of the research community. Few operational research paper recommender systems have been developed though. The main objective of this review paper is to summaries the state-of-the-art research paper recommender systems classification categories. Findings and concepts on data access and manipulations in the field of research paper recommendation will be highlighted, summarized, and disseminated. This chapter will be centered on reviewing articles in the field of research paper recommender systems published from the early 1990s until 2017.


Author(s):  
Ramin Neshati ◽  
Tugrul Daim

The Internet has changed the world in many ways. Online communications, financial and business-to-business transactions, electronic shopping, banking, and entertainment have become the norm in the digital age. The combined package of technologies that comprise the Internet—the information superhighway—have made all of this possible. The aging technological infrastructure that supports these webs of interconnected networks is being stressed to its performance limits. Recent advances in the backbone infrastructure that supports the Internet have helped alleviate some of these problems, but more challenges lie ahead for solving technology-related performance bottlenecks for many online applications, including high-definition interactive gaming. In this paper, the authors developed a technology assessment through multiple perspectives. While different components of the technology such as applications, protocols and network components are identified, other impact areas such as market and management are also evaluated. Elements of user behavior are evaluated within the market perspective. Evaluating technologies through these dimensions concurrently provides a balanced assessment among technical, economical, social and political factors.


Author(s):  
Duygu Dersan Orhan

Through the development of technology, the understanding of traditional foreign policy has changed. Foreign policy making, which was shaped by diplomatic correspondence, visits, agreements, and notes between countries, is carried out today via messages sent over the Internet. Twitter is the most frequently used internet tool in the hands of institutions, decision makers, and leaders in foreign policy making. US President Donald J. Trump is one of the leaders who use Twitter most effectively. Twitter was the center of Trump's messages, both during the presidential campaign and after his election. Trump is not just using Twitter as a platform for meeting his supporters and announcing the country's official policies. Twitter has also been an important way for Trump to challenge and send harsh messages to certain countries, companies, and individuals. Iran is one of the countries that Trump targets through Twitter. This study aims to examine the use of Twitter as a platform in foreign policy making by using content analysis method through Trump's tweets about Iran.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 37 ◽  
Author(s):  
S Sridevi ◽  
M Bindu Prathyusha ◽  
P V.S.J.Krishna Teja

India being a horticulture nation yet utilizing conventional methods in agriculture. Right now suggestions for farmers depend upon the coordination among farmers and distinctive specialists. Proposed suggestions generally given to them by using past farming exercises with help of their knowledge and experience to give advanced outcomes. The proposed idea is the utilization of mining techniques in agriculture to give best suggestions to farmers for crops, crop rotation, prices of crops, quality of seeds and recognizable proofs of needed fertilizer. The system can be utilized by farmers as an application both on web and mobile. It is an advanced cultivating method that utilizes  investigate information of soil qualities, soil types, crop yield information gathering and recommends the farmers to quality harvest in light of their site specific parameters. This diminishes the wrong decision on a harvest and increase in efficiency. With the progress of this rural modernization, agriculture site was progressively turning into a noteworthy instrument for farmers getting data about existence and generation. Step by step instructions to make the examination of the requirements of farmers viable to help them to discover the data assets of the Internet they were occupied with had turned into a dire and vital issue. It was vital hugeness in enhancing the structure and substance of agribusiness site, which could give better administrations to farmers and also enhance the level of modernization of horticultural generation.


2020 ◽  
Vol 2 (1-4) ◽  
pp. 17-28
Author(s):  
Adeyemi R. Ikuesan ◽  
Mazleena Salleh ◽  
Hein S. Venter ◽  
Shukor Abd Razak ◽  
Steven M. Furnell

AbstractThe prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, to layers such as layer 5 of the OSI model stack. This coupled with the integration-diversity of other layers and application layer protocols has made identification of user-initiated HTTP web traffic complex, thus increasing user anonymity on the Internet. This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. The result demonstrates that user-initiated HTTP requests can be reliably identified with a recall rate at 0.94 and F-measure at 0.969. Additionally, this study extends the paradigm of user identification based on the intrinsic characteristics of users, exhibited in network traffic. The application of these research findings finds relevance in user identification for insider investigation, e-commerce, and e-learning system as well as in network planning and management. Further, the findings from the study are relevant in web usage mining, where user-initiated action comprises the fundamental unit of measurement.


2018 ◽  
Vol 176 ◽  
pp. 03011
Author(s):  
ZHANG Yi-wen ◽  
BAI Yan-qi ◽  
YANG An-ju

In recent years, with the rapid increase of users active on the Internet, Internet users access log is also increasing rapidly. According to the user's Internet access log analysis of the characteristics of user behavior on the Internet. In this paper, we classify the statistical analysis of the behavior of Internet users by collecting information and data on urban and rural Internet user behavior. This result may provide a basis for guiding the behavior of Internet software manufacturers or government.


2014 ◽  
Vol 543-547 ◽  
pp. 4690-4693
Author(s):  
Xu Cao

The evaluation of sports teaching quality is important to the development of school sports and teaching reform. Having consulted some research papers and multiple teaching methods, the authors tried to apply Markov Chain Method to the evaluation of sports teaching quality. The result shows that Markov Chain Method is scientific in reasoning, reliable in calculation and feasible in practice. It can reflect the teachers' teaching quality and the students' learning results all-sided and correctly. Therefore, Markov Chain Method is an ideal method for the evaluation of sports teaching quality.


2020 ◽  
Vol 17 (6) ◽  
pp. 2468-2474
Author(s):  
Rasmeet Kaur ◽  
B. L. Raina ◽  
Avinash Sharma

Internet of Things (IoT) appears to be a signature phrase in the field of Information technology. The term immensely strikes our lives. It becomes more recognized in recent years. Today we are experiencing technology called IoT which is revolutionizing almost every branch of activity. Internet of things envisaged as a network of billions of objects amenable to communicate with one another. The Internet of Things strives to a malgamate all the devices under one roof. These devices can be monitored and controlled at any moment. They can communicate, exchange information and perform the desired operations. Taking note of this, the paper addresses the IoT concept using analysis of research papers, corporate persuasive reports, scholarly review articles, and online databases. Furthermore, the paper comes up with an overview of IoT including definition, Genesis, the chronology of IoT, Obligations for IoT, Aliases, architecture and different technologies regularly used in IoT in a systematic approach. The paper also discusses the application areas of its and security concerns.


Arabica ◽  
2011 ◽  
Vol 58 (5) ◽  
pp. 404-429
Author(s):  
Marie Baize-Robache

AbstractThis article deals with contemporary Arabic through a corpus extracted from the website <ext-link ext-link-type="url" xlink:href="www.aljazeera.net">www.aljazeera.net</ext-link>. Before comparing the extended verbal forms of this corpus with the same verbal forms found in the newspaper al-ayāt, it first defines the object as well as the analysis method of the corpora. In a third part, it moves on to the study of the extended verbal forms, like this: (1) the analysis of few significant instances, (2) the statistical report of this few values for the forms of each corpus. The whole of these instances reveals that, if there are some evolutions in the functioning of the forms in relation to the Arabist standard, the Internet corpus does not present any single one in comparison to the paper corpus.


Sign in / Sign up

Export Citation Format

Share Document