检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:商家衡 郝久月[2] Shang Jiaheng;Hao Jiuyue(People's Public Security University of China,Beijing 100038,China;First Research Institute of The Ministry of Public Security of PRC)
机构地区:[1]中国人民公安大学,北京100038 [2]公安部第一研究所
出 处:《计算机时代》2022年第5期25-28,共4页Computer Era
摘 要:针对现代互联网环境下,网络日志规模急速扩张,可挖掘内容极为丰富的现状,梳理国内基于网络日志的用户行为检测和用户画像领域的主要文献及工作。简要叙述上述两个领域的基本理论,并以公安工作、电子商务、医疗健康、旅游行业和图书馆业这五个行业中的案例来总结上述两个领域内的主要应用。对网络日志进行挖掘可以极大地提升用户体验,但也要正视其在隐私保护方面的缺失。In view of the rapid expansion of Web logs in the modern Internet environment and the current situation of extremely rich content can be explored, in this paper, the main literature and work in the field of user behavior detection and user portrait based on Web logs in China are sorted out. Briefly describing the basic theories of the above two fields, the actual cases in the five industries of public security work, e-commerce, medical health, tourism and library industry are used to summarize the main applications in the above two fields. Mining weblog can greatly enhance user experience, but it should also face up to its lack of privacy protection.
分 类 号:TP391.1[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117