English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110934/141854 (78%)
Visitors : 47821058      Online Users : 1182
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/59439
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/59439


    Title: 智慧型手機使用模式之探勘
    Mining Application Usage Patterns of Smartphone Users
    Authors: 曾菀柔
    Tseng, Woan Rou
    Contributors: 徐國偉
    Hsu, Kuo Wei
    曾菀柔
    Tseng, Woan Rou
    Keywords: 資料探勘
    智慧型手機
    使用模式
    Data mining
    Sequential pattern mining
    Smartphone application
    User behavior
    Date: 2012
    Issue Date: 2013-09-02 16:48:27 (UTC+8)
    Abstract: 近幾年內,行動裝置科技、尤其是智慧型手機的蓬勃發展,在許多方面都影響了人們工作和生活的方式。具備不同功能的應用程式,能夠增強智慧型手機的功能,並且更加符合使用者的個人需求,為人們帶來許多便利和娛樂。因此,了解使用者使用何種應用程式、以及使用者如何使用這些應用程式,是相當重要的議題。
    研究者們已經提出了許多相關的研究,以期提供更好的使用者經驗給智慧型手機使用者。然而,這類研究大多是根據問卷調查、或者在實驗室環境下所進行的實驗,只能有限的反映真實世界中的使用者行為。在本論文中,為了克服這些限制,實作了資料探勘的技術,應用在一長時間收集而來的真實資料上,以發掘使用者行為中的顯著規律。
    首先,本論文應用了傳統的關聯式規則探勘、以及序列式規則探勘的演算法,並且針對他們的不足進行討論。接著,本論文定義一段session為使用者單次的使用區段,包含使用者在這段期間內的行為記錄,並且提出一個資料前處理的流程以轉換原始資料成session。最後,本論文提出一個序列式規則探勘演算法的延伸,藉由限制session內應用程式使用的時間間隔,來產生代表更強烈關聯性的規則,並且蘊含更豐富的智慧型手機使用者行為資訊。
    本論文對於智慧型手機應用程式的使用者行為分析,做出以下三個貢獻:第一,本論文提供一套資料前處理的流程,可用於此類型的分析研究;第二,本論文提出一個從序列式規則探勘演算法所延伸而出的演算法,特別適用於智慧型手機使用者行為記錄資料的規則探勘;第三,本論文提供了規則的相關分析。
    本論文使用真實世界的資料集來探勘,發掘出的規則可以反映和解釋智慧型手機使用者的行為,並且,透過詳細的分析,這些結果有助於智慧型手機中,相關應用程式以及使用者介面的設計。
    The development of smartphone technology has changed the way people work and live in many aspects in just a few years. The advanced operating systems on smartphones allow developers to create applications that enhance the functions of the smartphones, and the applications help users personalize their smartphones to enrich their work and lives. Various types of applications designed for smartphones emerge and bring people convenience and entertainment. Therefore, it is practically interesting and important to study what applications people use on their smartphones and how people use these applications. Many studies are conducted in order to provide a better user experience to smartphone users. However, most of these studies are based on questionnaire surveys or designed experiments that are performed in a laboratory setting and would be limited to reflect the actual application usage done by users in their daily lives. To overcome the limitation, we apply data mining techniques to a data set, which contains smartphone logs collected from several users over a long period of time, and intend to discover meaningful patterns that represent user behaviors. First of all, we apply the classic association rule mining algorithm and the traditional sequential pattern mining algorithm to the data set, and we discuss their weaknesses for mining application usage patterns of smartphone users. Then, we propose a data processing process that transforms the logs into sessions rather than transactions or sequences. We define a session as a user’s one-time usage period. Each session contains the user behavior during the period, including the applications used. Next, we propose an extension of a sequential pattern mining that allows us to take time constraints into account. Stronger rules can be generated by restricting shorter intervals between applications used, and they give us much deeper knowledge of user behaviors. In summary, this thesis contributes to user behavior analysis for smartphone applications from the following three aspects: First, it provides a data processing process that is essential for the analysis. Second, it provides an algorithm extended from a widely used sequential pattern mining algorithm and designed to discover rules from logs recording activities of smartphone users. Third, it provides an analysis on the discovered rules. This thesis contributes to a better understanding of smartphone users’ behaviors and a detailed analysis to the results. It uses a real data set to discover rules that could be beneficial to the designers of smartphone applications and user interfaces.
    Reference: [1] H. Verkasalo. “Analysis of Smartphone User Behavior,” in Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), 2010 Ninth International Conference on. IEEE, June 2010, pp. 258-263.
    [2] P. Lei, T. Shen, W. Peng, and I. Su. “Exploring Spatial-Temporal Trajectory Model for Location Prediction,” 12th IEEE International Conference on Mobile Data Management, 2011.
    [3] C. Hung, C. Chang, and W. Peng. “Mining Trajectory Profiles for Discovering User Communities,” ACM LBSN’09, Seattle, WA, USA, November 2009.
    [4] C. Hung, W. Peng, and W. Lee. “Clustering and Aggregating clues for trajectories for mining trajetory patterns and routes,” The VLDB Journal, November 2011.
    [5] L. Wei, W. Peng, B. Chen, and T. Lin. “PATS: A Framework of Pattern-Aware Trajectory Search,” 11th IEEE International Conference on Mobile Data Management, 2010.
    [6] G. Chittaranjan, J. Blom, and D. Gatica-Perez. “Mining large-scale smartphone data for personality studies,” IEEE International Symposium on Wearable Computers, San Francisco, CA, June 2011.
    [7] L. Xie, X. Zhang, J. Seifert, and S. Zhu. “pBMDS: A Behavior-based Malware Detection System for Cellphone Devices,” ACM WiSec’10, Hoboken, NJ, March 2010.
    [8] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. “Crowdroid: Behavior-Based Malware Detection System for Android,” ACM SPSM’11, Chicago, IL, October 2011.
    [9] O. Franko, and T. Tirrell. “Smartphone App Use Among Medical Providers in ACGME Training Programs,” Journal of Medical Systems, Volume 36 Issue 5, October 2012, pp. 3135-3139.
    [10] T. Smura. “Access alternatives to mobile services and content: analysis of handset-based smartphone usage data,” ITS 17th Biennial Conference, Montreal, Canada, June, 2008.
    [11] H. Verkasalo. “Analysis of Smartphone User Behavior,” 2010 Ninth International Conference on Mobile Business / 2010 Ninth Global Mobility Roundtable, Athens, Greece, June, 2010.
    [12] Q. Xu, J. Erman, A. Gerber, Z. Mao, J. Pang, and S. Venkataraman. “Identifying diverse usage behaviors of smartphone apps,” IMC’11 Proceedings of the 2011 ACM SIGCOMM Conference on Internet measurement conference, New York, USA, 2011, pp. 329-344.
    [13] H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and D. Estrin. “Diversity in Smartphone Usage,” ACM MobiSys’10, June 2010, San Francisco, CA, June 2010.
    [14] J. Kang, S. Seo, and J. Hong. “Usage Pattern Analysis of Smartphones,” Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific, Taipei, Taiwan, September 2011.
    [15] M. Chen, J. Han, and P. S. Yu. “Data Mining: An Overview from a Database Perspective,” IEEE Transaction on Knowledge and Data Engineering, Vol. 8, No. 6, December 1996.
    [16] R. Agrawal, T. Imielinski, and A. Swami. “Mining Association Rules between Sets of Items in Large Databases,” ACM SIGMOD, Washington DC, USA, May 1993.
    [17] R. Agrawal, and R. Srikant. “Fast Algorithms for Mining Association Rules,” in Proceedings of the 20th International Conference on Very Large Data Bases (VLDB’94), San Francisco, CA, USA, 1994.
    [18] R. Agrawal, and R. Srikant. “Mining Sequential Patterns,” in Proceedings of the 11th International Conference on Data Engineering (ICDE’95), 1995.
    [19] R, Iváncsy, and I. Vajk. “Frequent Pattern Mining in Web Log Data,” Journal of Applied Sciencces at Budapest Tech Hungary, Volume 3 Issue 1, 2006.
    [20] N. Mabroukeh, and C. Ezeife. “A Taxonomy of Sequential Pattern Mining Algorithms,” Journal of ACM Computing Surveys (CSUR), Volume 43 Issue 1, November 2010.
    [21] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U.Dayal, and M. Hsu. “PrefixSpan: Mining Sequential Patterns Efficiently by Prefix-Projected Pattern Growth,” in Proceedings of the 2001 International Conference on Data Engineering (ICDE’01), Heidelberg, Germany, April 2001.
    [22] T. Rincy. N, and Y. Pandey. “Perfermance Evaluation on State of the Art Sequential Pattern Mining Algorithms,” International Journal of Computer Applications, Volume 65 Number 14, 2013.
    [23] J. Chen. “An UpDown Directed Acyclic Graph Approach for Sequential Pattern Mining,” IEEE Transactions on Knowledge and Data Engineering, Volume 22 Issue 7, July 2010.
    [24] P. Chen, C. Chen, W. Liao, and T. Li. “A Service Platform for Logging and Analyzing Mobile User Behaviors,” in Proceedings of Edutainment 2011, LNCS 6872, 2011.
    [25] P. Chen, H. Wu, C. Hsu, W. Liao, and T. Li. “Logging and Analyzing Mobile User Behaviors,” International Symposium on Cyber Behavior, Taipei, Taiwan, February 2012.
    [26] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. Witten. “The WEKA Data Mining Software: An Update,” SIGKDD Explorations, Volume 11 Issue 1, 2009.
    [27] Viger Philippe Fournier. SPMF- A Sequential Pattern Mining Framework, http://www.philippe-fournier-viger.com/spmg/
    [28] Q. Zhao, and S. S. Bhowmick. “Association Rule Mining: A Survey,” Technical Report, CAIS, Nanyang Technological University, Singapore, No. 2003116, 2003.
    [29] J. Han, M. Kamber, and J. Pei. Data Mining: Concepts and Techniques. Morgan Kaufmann, 2011.
    [30] Q. Zhao, and S. S. Bhowmick. “Sequential Pattern Mining: A Survey,” Technical Report, CAIS, Nanyang Technological University, Singapore, No. 2003118, 2003.
    Description: 碩士
    國立政治大學
    資訊科學學系
    100753016
    101
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0100753016
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    301601.pdf1478KbAdobe PDF2725View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback