Tag

Behavior Analysis

0 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
Jan 15, 2025 · Backend Development

Challenges of PHP Applications and the Role of User Behavior Analysis

This article examines the current challenges faced by PHP applications—including performance, functionality, and competition—highlights the importance of user behavior analysis for uncovering needs and optimizing experience, and presents practical logging and analysis techniques with PHP code examples to improve performance and enable precise marketing.

Behavior AnalysisLoggingPHP
0 likes · 13 min read
Challenges of PHP Applications and the Role of User Behavior Analysis
DataFunSummit
DataFunSummit
Jul 9, 2023 · Big Data

Data Governance and Application for Behavior Analysis: Modeling Methods, Architecture, and Practical Cases

This article explains how a data‑ecosystem team governs and applies behavior‑analysis data by describing common analysis scenarios, data‑warehouse modeling methods and their pros and cons, the concepts and overall architecture of behavior‑centric analytics, key system components, and several concrete analysis examples such as retention, funnel and path analysis.

Behavior AnalysisBig DataData Warehouse
0 likes · 12 min read
Data Governance and Application for Behavior Analysis: Modeling Methods, Architecture, and Practical Cases
IT Services Circle
IT Services Circle
Feb 15, 2022 · Information Security

Analysis of Deepin's "Resignation Tendency Analysis" Service and Its Privacy Implications

The article examines how Deepin's "Resignation Tendency Analysis" service monitors employee online behavior, outlines the features offered, discusses legal and privacy concerns, and presents public reactions and alternative viewpoints on the broader issue of workplace surveillance.

Behavior Analysisdata privacyemployee monitoring
0 likes · 8 min read
Analysis of Deepin's "Resignation Tendency Analysis" Service and Its Privacy Implications
DataFunSummit
DataFunSummit
Dec 23, 2021 · Artificial Intelligence

User Clustering Techniques in Tencent KanDian: From Traditional Algorithms to N‑gram and action2vec

This article explains how Tencent KanDian analyzes user behavior by introducing the product, describing common clustering scenarios, reviewing traditional unsupervised methods, and detailing advanced path‑based approaches such as N‑gram and action2vec, while discussing their advantages, limitations, and practical applications.

AIBehavior AnalysisN-gram
0 likes · 12 min read
User Clustering Techniques in Tencent KanDian: From Traditional Algorithms to N‑gram and action2vec
DataFunTalk
DataFunTalk
Nov 8, 2021 · Artificial Intelligence

User Behavior Clustering in Tencent Kankan: From Traditional Unsupervised Methods to N‑gram and action2vec

This article introduces Tencent Kankan's product landscape and explores various user clustering techniques—including classic unsupervised algorithms, N‑gram based sequence clustering, and deep‑learning driven action2vec—detailing their implementation steps, advantages, limitations, and practical insights for product optimization.

Behavior AnalysisN-gramTencent
0 likes · 12 min read
User Behavior Clustering in Tencent Kankan: From Traditional Unsupervised Methods to N‑gram and action2vec
58 Tech
58 Tech
Aug 29, 2019 · Information Security

Graph-Based Anomaly Detection Framework for Security Threats

The article presents a graph‑based anomaly detection architecture that tackles black‑market resource switching by constructing complex user‑traffic networks, mining graph similarities, and applying multi‑dimensional strategies to achieve high‑accuracy detection while meeting timeliness, performance, and interpretability requirements.

Anomaly DetectionBehavior AnalysisBig Data
0 likes · 8 min read
Graph-Based Anomaly Detection Framework for Security Threats
JD Tech
JD Tech
Dec 10, 2018 · Information Security

Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe

JD Security’s Silicon Valley AI security scientist unveiled a novel container‑based sandbox at BlackHat Europe, detailing how contextual behavior analysis can detect and trace malicious code by leveraging lightweight containers, improving threat detection speed and accuracy for enterprise defenses.

AI securityBehavior AnalysisContainer Security
0 likes · 6 min read
Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe
Architects' Tech Alliance
Architects' Tech Alliance
Nov 28, 2016 · Big Data

User Profiling: Concepts, Stages, and Data Modeling Methods

This article explains the concept of user profiling, outlines its four-stage construction process, discusses the significance of tagging users, and details practical data modeling techniques—including static and dynamic data sources, weight calculations, and real‑world examples—aimed at improving precision marketing and recommendation systems.

Behavior AnalysisBig DataData Modeling
0 likes · 44 min read
User Profiling: Concepts, Stages, and Data Modeling Methods