Efficient Pattern Mining and Prediction of User Behavior in Mobile Commerce
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 12, Issue 6
Abstract
Mobile commerce has received a lot of interests from both of the industry and academia. A framework called Mobile Commerce Explorer for mining and prediction of mobile user’s movements and purchase transactions under the context of mobile commerce, consists of three major components , Similarity Inference Model (SIM), Personal mobile commerce pattern mine algorithm and Mobile Commerce Behavior Prediction. In the past only purchase data of users were used in recommender system before, while navigational and behavioral pattern data were not utilized. The method is to develop a recommender system based on navigation and behavior. First, all the data related to the purchase, navigational and behavioral patterns are gathered. The confidence levels obtained by the above analysis were used to determine a preference level for each pair of two products. The confidence levels between clicked products, between the products placed in the basket and between purchased products were calculated respectively and then, the preference level is estimated through the linear combination of above three confidence level. Here Random Walk with Restart (RWR) algorithm is used to retrieve items for recommendation to the user.
Authors and Affiliations
S. Kiruthika
Size and Topological Optimization of Cantilever Beam
Optimization is the process of selecting the best possible results among many possible results under given circumstances. Mathematically it is finding the global maxima or minima of a function. This paper concerns...
Enhancement of the Performance of Ring Laser Gyro using Silane Compound
Ring Laser Gyro ( RLG ), in its original form is insensitive to small rotation rates. This insensitivity occurs because of the coupling between the two counter propagating travelling waves, having a very low frequency di...
Implementation of Hamming code using VLSI
This paper tries to explain the implementation of hamming code using VLSI. In the present world the field of communication has got many applications, and in every field the data is encoded at the transmitter and tr...
A Review on some aspects of Black Hole Attack in MANET
A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vu...
The Comparative Study of Adaptive Channel Equalizer Based on Fixed and Variable Step-Size LMS Algorithm & its Variants for Non Stationery Wireless Channel
-the performance of modern communication system can be reduced by non ideal characteristic of the channel, which is known as inter-symbol interference (ISI).The equalization technique is an efficient method to over...