17 results on '"user behaviour modelling"'
Search Results
2. E-Step Control: Solution for Processing and Analysis of IS Users Activities in the Context of Insider Threat Identification Based on Markov Chain
- Author
-
Ņikiforova, Oksana, Zabiniako, Vitaly, Kornienko, Jurijs, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2024
- Full Text
- View/download PDF
3. BanditProp: Bandit Selection of Review Properties for Effective Recommendation.
- Author
-
XI WANG, OUNIS, IADH, and MACDONALD, CRAIG
- Subjects
ROBBERS ,RECOMMENDER systems ,FEATURE selection - Abstract
Many recent recommendation systems leverage the large quantity of reviews placed by users on items. However, it is both challenging and important to accurately measure the usefulness of such reviews for effective recommendation. In particular, users have been shown to exhibit distinct preferences over different types of reviews (e.g., preferring longer versus shorter or recent versus old reviews), indicating that users might differ in their viewpoints on what makes the reviews useful. Yet, there have been limited studies that account for the personalised usefulness of reviews when estimating the users' preferences. In this article, we propose a novel neural model, called BanditProp, which addresses this gap in the literature. It first models reviews according to both their content and associated properties (e.g., length, sentiment and recency). Thereafter, it constructs a multi-task learning (MTL) framework to model the reviews' content encoded with various properties. In such an MTL framework, each task corresponds to producing recommendations focusing on an individual property. Next, we address the selection of the features from reviews with different review properties as a bandit problem using multinomial rewards. We propose a neural contextual bandit algorithm (i.e., ConvBandit) and examine its effectiveness in comparison to eight existing bandit algorithms in addressing the bandit problem. Our extensive experiments on two well-known Amazon and Yelp datasets show that BanditProp can significantly outperform one classic and six existing state-of-the-art recommendation baselines. Moreover, BanditProp using ConvBandit consistently outperforms the use of other bandit algorithms over the two used datasets. In particular, we experimentally demonstrate the effectiveness of our proposed customised multinomial rewards in comparison to binary rewards, when addressing our bandit problem. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. The Emergence of Internet Protocol Television as Next Generation Broadcast Network
- Author
-
Srinivasa Murthy, P. L., Venu Gopal, T., Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Satapathy, Suresh Chandra, editor, Prasad, V. Kamakshi, editor, Rani, B. Padmaja, editor, Udgata, Siba K., editor, and Raju, K. Srujan, editor
- Published
- 2017
- Full Text
- View/download PDF
5. An individual-group-merchant relation model for identifying fake online reviews: an empirical study on a Chinese e-commerce platform.
- Author
-
Yu, Chuanming, Zuo, Yuheng, Feng, Bolin, An, Lu, and Chen, Baiyun
- Subjects
- *
ONLINE shopping , *CONSUMER behavior , *ELECTRONIC commerce , *ECONOMIC competition - Abstract
During the online shopping process, customer reviews strongly influence consumers' buying behaviour. Fake reviews are increasingly utilized to manipulate products' reputations. Automatically and effectively identifying fake reviews has become a salient issue. This study proposes a novel individual-group-merchant relation model to automatically identify fake reviews on e-commerce platforms, which focuses on the behavioural characteristics of the stakeholders. Three groups of indicators are proposed, i.e., individual indicators, group indicators and merchant indicators. An unsupervised matrix iteration algorithm is utilized to calculate the fake degree values at individual, group and merchant levels. To validate the model, an empirical study of fake review identification on a Chinese e-commerce platform is implemented. A total of 97,804 reviews related to 93 online stores and 9558 different reviewers are randomly selected as the test data. The experimental results show that the F-measure values of the proposed method in identifying fake reviewers, online merchants and groups with reputation manipulation are 82.62%, 59.26% and 95.12%, respectively. The proposed method outperforms the traditional methods (e.g. Logistic Regression and K nearest neighbour) in identifying fake reviews. It suggests that the combinations of the behaviour indicators with content analysis can effectively improve the performances of the fake review identification. The proposed method is more scalable to large datasets and easier to be employed, as it does not require manual labelling training set and it eliminates the training of classification models. This study greatly contributes to purifying the Chinese environment of business competition and establishing a better regulatory mechanism for credit manipulation in China. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
6. HiTSKT: A hierarchical transformer model for session-aware knowledge tracing.
- Author
-
Ke, Fucai, Wang, Weiqing, Tan, Weicong, Du, Lan, Jin, Yuan, Huang, Yujin, and Yin, Hongzhi
- Subjects
- *
TRANSFORMER models , *DATA mining , *KNOWLEDGE representation (Information theory) - Abstract
Knowledge tracing (KT) aims to leverage students' learning histories to estimate their mastery levels on a set of pre-defined skills, based on which the corresponding future performance can be accurately predicted. In practice, a student's learning history comprises answers to sets of massed questions, each known as a session, rather than merely being a sequence of independent answers. Theoretically, within and across these sessions, students' learning dynamics can be very different. Therefore, how to effectively model the dynamics of students' knowledge states within and across the sessions is crucial for handling the KT problem. Most existing KT models treat student's learning records as a single continuing sequence, without capturing the sessional shift of students' knowledge state. To address the above issue, we propose a novel hierarchical transformer model, named HiTSKT, comprises an interaction(-level) encoder to capture the knowledge a student acquires within a session, and a session(-level) encoder to summarize acquired knowledge across the past sessions. To predict an interaction in the current session, a knowledge retriever integrates the summarized past-session knowledge with the previous interactions' information into proper knowledge representations. These representations are then used to compute the student's current knowledge state. Additionally, to model the student's long-term forgetting behaviour across the sessions, a power-law-decay attention mechanism is designed and deployed in the session encoder, allowing it to emphasize more on the recent sessions. Extensive experiments on four public datasets demonstrate that HiTSKT achieves new state-of-the-art performance on all the datasets compared with seven state-of-the-art KT models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Modelling aggregate hourly electricity consumption based on bottom-up building stock.
- Author
-
Oliveira Panão, Marta J.N. and Brito, Miguel C.
- Subjects
- *
ELECTRIC power consumption , *ELECTRICITY , *ENERGY consumption of buildings , *GENETIC algorithms , *ENERGY conversion - Abstract
This paper presents a building stock energy model for the estimation of hourly electricity consumption for a large group of residential buildings. A Monte Carlo model stochastically generates a large sample of dwellings representative of the building stock and the correspondent number of user profiles, statistically supported by a web survey about the use of energy in dwellings for space heating and cooling. The model uses hourly energy balance equations to estimate energy needs and calculates the mean annual electricity consumption for regularly occupied dwellings with an error below 3%. Model is also validated against independent smart-metered data of about 250 dwellings. Hourly electricity consumption results feature an overall normalised mean absolute error of 11% and normalised root mean square error of 16%. The maximum relative difference is ± 72% and the maximum absolute error is ≃217 Wh/h. The model is considered to be able to predict hourly electricity consumption accurately. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
8. Timeout Reached, Session Ends?
- Author
-
Dietz, Florian, Petras, Vivien, and Jäschke, Robert
- Subjects
Session-Analyse ,020 Bibliotheks- und Informationswissenschaften ,Session-Identifikation ,session modelling ,Session-Evaluation ,user behaviour modelling ,Session-Modellierung ,session evaluation ,session analysis ,session identification ,005 Computerprogrammierung, Computerprogramme, Daten ,AN 77500 ,ST 530 ,ddc:020 ,ddc:000 ,000 Informatik, Informationswissenschaft, allgemeine Werke ,ddc:005 ,task extraction ,Verhaltensmodellierung - Abstract
Die Identifikation von Sessions zum Verständnis des Benutzerverhaltens ist ein Forschungsgebiet des Web Usage Mining. Definitionen und Konzepte werden seit über 20 Jahren diskutiert. Die Forschung zeigt, dass Session-Identifizierung kein willkürlicher Prozess sein sollte. Es gibt eine fragwürdige Tendenz zu vereinfachten mechanischen Sessions anstelle logischer Segmentierungen. Ziel der Dissertation ist es zu beweisen, wie unterschiedliche Session-Ansätze zu abweichenden Ergebnissen und Interpretationen führen. Die übergreifende Forschungsfrage lautet: Werden sich verschiedene Ansätze zur Session-Identifizierung auf Analyseergebnisse und Machine-Learning-Probleme auswirken? Ein methodischer Rahmen für die Durchführung, den Vergleich und die Evaluation von Sessions wird gegeben. Die Dissertation implementiert 135 Session-Ansätze in einem Jahr (2018) Daten einer deutschen Preisvergleichs-E-Commerce-Plattform. Die Umsetzung umfasst mechanische Konzepte, logische Konstrukte und die Kombination mehrerer Mechaniken. Es wird gezeigt, wie logische Sessions durch Embedding-Algorithmen aus Benutzersequenzen konstruiert werden: mit einem neuartigen Ansatz zur Identifizierung logischer Sessions, bei dem die thematische Nähe von Interaktionen anstelle von Suchanfragen allein verwendet wird. Alle Ansätze werden verglichen und quantitativ beschrieben sowie in drei Machine-Learning-Problemen (wie Recommendation) angewendet. Der Hauptbeitrag dieser Dissertation besteht darin, einen umfassenden Vergleich von Session-Identifikationsalgorithmen bereitzustellen. Die Arbeit bietet eine Methodik zum Implementieren, Analysieren und Evaluieren einer Auswahl von Mechaniken, die es ermöglichen, das Benutzerverhalten und die Auswirkungen von Session-Modellierung besser zu verstehen. Die Ergebnisse zeigen, dass unterschiedlich strukturierte Eingabedaten die Ergebnisse von Algorithmen oder Analysen drastisch verändern können. The identification of sessions as a means of understanding user behaviour is a common research area of web usage mining. Different definitions and concepts have been discussed for over 20 years: Research shows that session identification is not an arbitrary task. There is a tendency towards simplistic mechanical sessions instead of more complex logical segmentations, which is questionable. This dissertation aims to prove how the nature of differing session-identification approaches leads to diverging results and interpretations. The overarching research question asks: will different session-identification approaches impact analysis and machine learning tasks? A comprehensive methodological framework for implementing, comparing and evaluating sessions is given. The dissertation provides implementation guidelines for 135 session-identification approaches utilizing a complete year (2018) of traffic data from a German price-comparison e-commerce platform. The implementation includes mechanical concepts, logical constructs and the combination of multiple methods. It shows how logical sessions were constructed from user sequences by employing embedding algorithms on interaction logs; taking a novel approach to logical session identification by utilizing topical proximity of interactions instead of search queries alone. All approaches are compared and quantitatively described. The application in three machine-learning tasks (such as recommendation) is intended to show that using different sessions as input data has a marked impact on the outcome. The main contribution of this dissertation is to provide a comprehensive comparison of session-identification algorithms. The research provides a methodology to implement, analyse and compare a wide variety of mechanics, allowing to better understand user behaviour and the effects of session modelling. The main results show that differently structured input data may drastically change the results of algorithms or analysis.
- Published
- 2022
9. Timeout Reached, Session Ends?
- Author
-
Petras, Vivien, Jäschke, Robert, Dietz, Florian, Petras, Vivien, Jäschke, Robert, and Dietz, Florian
- Abstract
Die Identifikation von Sessions zum Verständnis des Benutzerverhaltens ist ein Forschungsgebiet des Web Usage Mining. Definitionen und Konzepte werden seit über 20 Jahren diskutiert. Die Forschung zeigt, dass Session-Identifizierung kein willkürlicher Prozess sein sollte. Es gibt eine fragwürdige Tendenz zu vereinfachten mechanischen Sessions anstelle logischer Segmentierungen. Ziel der Dissertation ist es zu beweisen, wie unterschiedliche Session-Ansätze zu abweichenden Ergebnissen und Interpretationen führen. Die übergreifende Forschungsfrage lautet: Werden sich verschiedene Ansätze zur Session-Identifizierung auf Analyseergebnisse und Machine-Learning-Probleme auswirken? Ein methodischer Rahmen für die Durchführung, den Vergleich und die Evaluation von Sessions wird gegeben. Die Dissertation implementiert 135 Session-Ansätze in einem Jahr (2018) Daten einer deutschen Preisvergleichs-E-Commerce-Plattform. Die Umsetzung umfasst mechanische Konzepte, logische Konstrukte und die Kombination mehrerer Mechaniken. Es wird gezeigt, wie logische Sessions durch Embedding-Algorithmen aus Benutzersequenzen konstruiert werden: mit einem neuartigen Ansatz zur Identifizierung logischer Sessions, bei dem die thematische Nähe von Interaktionen anstelle von Suchanfragen allein verwendet wird. Alle Ansätze werden verglichen und quantitativ beschrieben sowie in drei Machine-Learning-Problemen (wie Recommendation) angewendet. Der Hauptbeitrag dieser Dissertation besteht darin, einen umfassenden Vergleich von Session-Identifikationsalgorithmen bereitzustellen. Die Arbeit bietet eine Methodik zum Implementieren, Analysieren und Evaluieren einer Auswahl von Mechaniken, die es ermöglichen, das Benutzerverhalten und die Auswirkungen von Session-Modellierung besser zu verstehen. Die Ergebnisse zeigen, dass unterschiedlich strukturierte Eingabedaten die Ergebnisse von Algorithmen oder Analysen drastisch verändern können., The identification of sessions as a means of understanding user behaviour is a common research area of web usage mining. Different definitions and concepts have been discussed for over 20 years: Research shows that session identification is not an arbitrary task. There is a tendency towards simplistic mechanical sessions instead of more complex logical segmentations, which is questionable. This dissertation aims to prove how the nature of differing session-identification approaches leads to diverging results and interpretations. The overarching research question asks: will different session-identification approaches impact analysis and machine learning tasks? A comprehensive methodological framework for implementing, comparing and evaluating sessions is given. The dissertation provides implementation guidelines for 135 session-identification approaches utilizing a complete year (2018) of traffic data from a German price-comparison e-commerce platform. The implementation includes mechanical concepts, logical constructs and the combination of multiple methods. It shows how logical sessions were constructed from user sequences by employing embedding algorithms on interaction logs; taking a novel approach to logical session identification by utilizing topical proximity of interactions instead of search queries alone. All approaches are compared and quantitatively described. The application in three machine-learning tasks (such as recommendation) is intended to show that using different sessions as input data has a marked impact on the outcome. The main contribution of this dissertation is to provide a comprehensive comparison of session-identification algorithms. The research provides a methodology to implement, analyse and compare a wide variety of mechanics, allowing to better understand user behaviour and the effects of session modelling. The main results show that differently structured input data may drastically change the results of algorithms or analysis.
- Published
- 2022
10. A Review of Smart House Analysis Methods for Assisting Older People Living Alone.
- Author
-
Sanchez, Veralia Gabriela, Pfeiffer, Carlos F., and Skeie, Nils-Olav
- Subjects
INTELLIGENT houses ,CONGREGATE housing ,HOUSING for people with disabilities ,PATTERN recognition systems ,INFORMATION technology - Abstract
Smart Houses are a prominent field of research referring to environments adapted to assist people in their everyday life. Older people and people with disabilities would benefit the most from the use of Smart Houses because they provide the opportunity for them to stay in their home for as long as possible. In this review, the developments achieved in the field of Smart Houses for the last 16 years are described. The concept of Smart Houses, the most used analysis methods, and current challenges in Smart Houses are presented. A brief introduction of the analysis methods is given, and their implementation is also reported. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
11. Modelling of domestic and foreign visitors’ behaviour at commercial bank website during the recent financial crisis
- Author
-
Martin Drlík, Anna Pilková, Michal Munk, and Peter Švec
- Subjects
Basel 2 Pillar 3 ,information disclosure ,user behaviour modelling ,web log mining ,website analytics ,Agriculture ,Biology (General) ,QH301-705.5 - Abstract
The paper focuses on modelling of commercial bank website visitors’ behaviour. The authors analyse domestic and foreign market participants’ interests in mandatory financial information disclosure of a commercial bank during the recent financial crisis and try to answer the question whether the purposes of Basel 2 regulations under the Pillar 3 – Market discipline, publishing financial information, have been fulfilled. The authors analyse bank website logs files using web log mining methods to better understand the rate of using of web pages, where mandatory financial information about Basel 2 is published. After data pre-processing the authors use association rule analysis to identify the association among content categories of the website. The results show that there is small interest in mandatory financial information disclosure by the commercial bank in general. The foreign website visitors take more concern in mandatory financial information disclosure, and they take less interest in general information about bank than domestic ones.
- Published
- 2013
- Full Text
- View/download PDF
12. A Review of Smart House Analysis Methods for Assisting Older People Living Alone
- Author
-
Veralia Gabriela Sanchez, Carlos F. Pfeiffer, and Nils-Olav Skeie
- Subjects
smart environment ,assisted living ,user activity recognition ,user behaviour modelling ,pattern recognition ,challenges ,limitations ,Technology - Abstract
Smart Houses are a prominent field of research referring to environments adapted to assist people in their everyday life. Older people and people with disabilities would benefit the most from the use of Smart Houses because they provide the opportunity for them to stay in their home for as long as possible. In this review, the developments achieved in the field of Smart Houses for the last 16 years are described. The concept of Smart Houses, the most used analysis methods, and current challenges in Smart Houses are presented. A brief introduction of the analysis methods is given, and their implementation is also reported.
- Published
- 2017
- Full Text
- View/download PDF
13. Multi-Agent Architecture for Control of Heating and Cooling in a Residential Space.
- Author
-
ZUPANČIČ, DOMEN, LUŠTREK, MITJA, and GAMS, MATJAŽ
- Subjects
- *
MULTIAGENT systems , *HEATING , *COOLING systems , *ALGORITHMS , *MACHINE learning , *ENERGY consumption - Abstract
Energy demand in a smart grid is directly related to energy consumption, as defined by user needs and comfort experience. This article presents a multi-agent architecture for smart control of space heating and cooling processes, in an attempt to enable flexible ways of monitoring and adjusting energy supply and demand. In this proposed system, control agents are implemented in order to perform temperature set-point delegation for heating and cooling systems in a building, offering a means to observe and learn from both the environment and the occupant. Operation of the proposed algorithms is compared with traditional algorithms utilized for room heating, using a simulated model of a residential building and real data about user behaviour. The results show (i) the performance of machine learning for the occupancy forecasting problem and for the problem of calculating the time to heat or cool a room; and (ii) the performance of the control algorithms, with respect to energy consumption and occupant comfort. The proposed control agents make it possible to significantly improve an occupant comfort with a relatively small increase in energy consumption, compared with simple control strategies that always maintain predefined temperatures. The findings enable the smart grid to anticipate the energy needs of the building. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
14. Understanding Your Needs: An Adaptive VoD System.
- Author
-
Mu, Knowles, William, and Race, Nicholas
- Abstract
Video-on-demand (VoD) is becoming a popular service for commercial content distribution by offering end users the freedom to access recorded programmes. The management of on-demand assets is essential to maximise the efficiency of storage and network utilisation as well as advertisement. This paper introduces our recent efforts in design and implementation of an adaptive VoD archive system in an IPTV infrastructure. The system exploits live statistics on the user behaviours as well as the dynamic popularity of VoD programmes. Using the modelled programme popularity function, the VoD archive is capable of managing the VoD repository by adapting to the most recent user requests. The design has greatly improved the activity of VoD repository and user experience in on-demand services. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
15. Understanding the impact of loyal user behaviour on Internet access pricing: a game-theoretic framework.
- Author
-
Trinh, Tuan, Gyarmati, László, and Sallai, Gyula
- Subjects
INTERNET service providers ,PRICING ,CUSTOMER loyalty ,GAME-theoretical semantics ,STATISTICAL correlation ,NONCOOPERATIVE games (Mathematics) - Abstract
In this paper, we investigate the impacts of user behaviour-user loyalty in particular-on pricing strategies of Internet Service Providers (ISPs) for a profitable yet sustainable Internet access marketplace. We carry out an extensive empirical analysis of customer loyalty issues of ISP markets including our own survey in the Hungarian ISP market. Based on the empirical results, we propose a realistic user loyalty model, the price difference dependent loyalty model. Next, we apply the loyalty model in game-theoretical framework where optimal Internet access pricing strategies are expressed. Our game-theoretic framework includes both short-term and long-term interaction cases (single-shot and repeated games, respectively) and is capable of dealing with uncertain as well as dynamic scenarios (Bayesian and Stackelberg games, respectively). Finally, we present the impacts of user loyalty on the prices and profits of ISPs in different scenarios based on simulation results. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
16. A Facebook event collector framework for profile monitoring purposes
- Author
-
Eduardo Rocha, Hugo Fonseca, Diogo Gomes, Paulo Salvador, and António Nogueira
- Subjects
User profile ,Social network ,business.industry ,Relational database ,Event (computing) ,Computer science ,Timeline ,computer.software_genre ,Security token ,Profile hijack ,Social networks ,World Wide Web ,Monitoring framework ,Malware ,business ,User behaviour modelling ,computer ,Graphical user interface - Abstract
Social networks have recently emerged to become vital tools for information and content dissemination among connections. Indeed, the immense increase of the number of users of Facebook made it rise to become the largest existing social network with more than 1.2 billion active users. However, these numbers also rose the attention of hackers and attackers who aim at propagating malware and viruses for obtaining confidential information regarding social network users. In this manner, it is crucial that each Facebook user is able to easily access, control and analyse the information shared on the corresponding profile so that profile usage deviations can be more efficiently detected. However, despite the fact that Facebook allows an analysis of all user actions through the Timeline Review, this information is not comprehensively organized and there is no statistical analysis of the user generated data. In this paper, we propose a novel framework comprising a Facebook event collector, which by being provided with an authentication token for a user profile obtained through a Facebook application developed for this purpose, collects all the corresponding posted information and stores it in a relational database for a posteriori analysis. Through the graphical interface of the developed application, users can access all stored information in a comprehensible manner, according to the type of event, thus facilitating the analysis of the user's behaviour. By storing each event with the corresponding timestamp, we are able to perform an efficient and comprehensive analysis of all posted contents and compute statistical models over the obtained data. In this manner, we can create a notion of normal usage profile and detect possible deviations which may be indicative of a compromised user account.
- Published
- 2014
- Full Text
- View/download PDF
17. Modeliranje mrežnog prometa višekorisničkih igara s preuzimanjem uloga temeljeno na korisnikovom ponašanju
- Author
-
Sužnjević, Mirko and Matijašević, Maja
- Subjects
Internet ,Elektrotehnika ,modeliranje korisničkog ponašanja ,TEHNIČKE ZNANOSTI. Elektrotehnika ,izvorišni model mrežnog prometa ,source network traffic model ,modeliranje mrežnog prometa ,udc:621.3(043.3) ,network traffic modelling ,umreženo virtualno okruženje ,user behaviour modelling ,TECHNICAL SCIENCES. Electrical Engineering ,networked virtual environment ,online game ,generiranje mrežnog prometa ,igra ,Electrical engineering ,communication network ,Network traffic modelling ,network traffic generation ,MMORPG ,komunikacijska mreža ,višekorisnička igra s preuzimanjem uloga - Abstract
While network traffic characteristics of Massively Multiplayer Online Role-Playing Games (MMORPG) are known to be very variable and somehow linked to game dynamics and user behaviour, the actual relationships have, thus far, not been described in a comprehensive and unified way, which could sucessfully be applied for synthetic traffic generation. This thesis aims to fill this gap by proposing a novel source based MMORPG traffic model, which explains and captures observed variations of traffic characteristics. The proposed model takes user behaviour at the application level as a starting point. As networked virtual worlds of MMORPGs are very complex, there is a wide variety of in-game situations based on “what users do” in the virtual world, which reflect onto network traffic in different ways. The model focuses on capturing, recognizing, understanding, and describing the relationships between user actions and network traffic. A classification proposed in this thesis distinguishes between the following user action categories: Trading, Questing, Player versus player combat, Dungeons, and Raiding. For each action category, a traffic model capturing the statistical characteristics of network traffic has been developed and validated through network traffic measurements. Client and server application protocol data unit size and interrarival time have been modeled by a combination of several distributions, including Weibull, Normal, Lognormal, Largest Extreme Value, and Deterministic. Next, the player behaviour over a sin-gle gaming session has been studied and modelled based on the defined action categories by using a first order Markov chain. Finally, the aggregate behaviour of all active users on a single MMORPG server has been described. The arrival of new players and departure of leaving players are modeled as a Homogeneous Poisson Process (HPP). Based on the proposed model, a functional architecture of a MMORPG traffic generator based on player behaviour, called UrBBaN-Gen, has been developed and implemented by using Java, Python and bash scripts, together with the open source software traffic generator – Distributed Internet Traffic Generator (D-ITG). Synthetic traffic generated by UrBBaN-Gen has been compared with independent empirical traces, and it has been demonstrated that the characteristics of the generated traffic closely follow the real traffic. Also, the model has been compared with the models found in literature, and its advantages over the existing models have been shown. The contribution of this thesis may be summarized as follows: Classification of user actions in the virtual world of MMORPGs, and characterization of associated network traffic ; User behaviour model based on categories of user actions, motivational parameters, and identified behavioural patterns on application level ; and Architecture and implementation of traffic generator based on the model and verification of the model through comparison of synthetic and real traffic. Karakteristike mrežnog prometa koji generiraju višekorisničke igre s preuzimanjem uloga su vrlo promjenjive. Varijacije u mrežnom opterećenju mogu dostizati i razliku od deset puta između najniže i najviše vrijednosti. Treba uzeti u obzir da je riječ o prosječnim vrijednostima u vremenskim periodima na razini minuta, pa čak i sati. U ovoj disertaciji predložen je izvorišni model mrežnog prometa. Izvorišni modeli mrežnog prometa temelje se na ponašanju aplikacija koje se nalaze na krajnjim točkama mreže. Predloženi model objašnjava i obuhvaća uočene varijacije karakteristika mrežnog prometa. Model se temelji na ponašanju korisnika unutar višekorisničkih igara s preuzimanjem uloga. Kao studijski slučaj koristi se umrežena igra World of Warcraft proizvođača Activision Blizzard. Kako su virtualni svjetovi ovih igara vrlo složeni, a broj interakcija i situacija u kojem se korisnik može naći velik, za potrebe modeliranja predložena je klasifikacija korisničkih akcija. Predložene kategorije korisničkih akcija su: trgovanje, traganje ili izvršavanje zadataka, borba između igrača, napadanje tamnica i masovno napadanje tamnica. Različitost identificiranih kategorija ponašanja potvrđena je kroz mjerenje i usporedbu karakteristika mrežnog prometa pojedinačne kategorije. Za svaku kategoriju kreiran je matematički model mrežnog prometa koji se sastoji od kompleksnih statističkih distribucija koje opisuju veličinu jedinica podataka koji se šalju na razini aplikacije (ne na razini, primjerice, datagrama protokola IP), te međudolazna vremena između dva uzastopna slanja jedinica podataka. Na temelju identificiranih kategorija provedena su mjerenja ponašanja korisnika pomoću kojih je kreiran model ponašanja korisnika. Kreirani model opisuje ponašanje pojedinačnog korisnika, ali i zbirno ponašanje svih korisnika na razini usluge. Također, proučen je odnos između psihološke motivacije korisnika i njihovog ponašanja na razini aplikacije. Razvijeni modeli ponašanja korisnika i njihov utjecaj na mrežne karakteristike prometa objedinjeni su kroz funkcijsku arhitekturu programskog generatora mrežnog prometa utemeljenog na ponašanju korisnika (engl. User Behaviour Based Network Traffic Generator - UrBBaN-Gen.). UrBBaN-Gen čine tri programska modula: 1) simulator korisničkog ponašanja, 2) sustav za kontrolu distribuiranog generiranja prometa te 3) generator mrežnog prometa. Simulator korisničkog ponašanja razvijen je primjenom programskog jezika Java, a sustav za kontrolu distribuiranog generiranja prometa primjenom Jave te Python i Bash skripti. Generator mrežnog prometa temelji se na softveru otvorenog koda Distribuirani internetski mrežni generator (engl. Distributed Internet Traffic Generator -- D-ITG), koji je modificiran kako bi se u njega ugradili modeli prometa predloženih kategorija korisničkih akcija. Razvijeni model mrežnog prometa je uspoređen s modelima za istu uslugu poznatima u literaturi te su pokazane njegove prednosti. Također, model je verificiran kroz usporedbu sintetičkog, računalno generiranog prometa sa stvarnim prometom, te je pokazano da karakteristike generiranog prometa zadovoljavajuće sliče karakteristikama stvarnog prometa. Znanstveni doprinos disertacije je sljedeći: 1. Klasifikacija tipova korisničkih akcija unutar virtualnih okruženja igara s preuzimanjem uloga i karakterizacija pripadajućeg mrežnog prometa, 2. Model ponašanja korisnika, temeljen na kategorijama korisničkih akcija, motivacijskim parametrima te identificiranim uzorcima ponašanja na razini aplikacije, i 3. Arhitektura i programska izvedba generatora mrežnog prometa zasnovanog na modelu i verifikacija modela kroz usporedbu sintetiziranog i stvarnog mrežnog prometa.
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.