CN105678457A - Method for evaluating user behavior on the basis of position mining - Google Patents

Method for evaluating user behavior on the basis of position mining Download PDF

Info

Publication number
CN105678457A
CN105678457A CN201610006088.7A CN201610006088A CN105678457A CN 105678457 A CN105678457 A CN 105678457A CN 201610006088 A CN201610006088 A CN 201610006088A CN 105678457 A CN105678457 A CN 105678457A
Authority
CN
China
Prior art keywords
user
behavior
place
time
pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610006088.7A
Other languages
Chinese (zh)
Inventor
张国容
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu small Hui creators science and Technology Co.
Original Assignee
Chengdu Xiaobu Chuangxiang Changlian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Xiaobu Chuangxiang Changlian Technology Co Ltd filed Critical Chengdu Xiaobu Chuangxiang Changlian Technology Co Ltd
Priority to CN201610006088.7A priority Critical patent/CN105678457A/en
Publication of CN105678457A publication Critical patent/CN105678457A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Data Mining & Analysis (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for evaluating user behavior on the basis of position mining. The method comprises following steps: a. obtaining position information to obtain tracking data and performing pretreatment to the tracking data; b. obtaining time distribution of a user at different places in different time through the tracking data to obtain a behavior pattern of the user; c. updating a user preference model by use of historical records of the user behavior pattern and determining whether a user behavior is an abnormal behavior according to the user preference model and calculating user behavior scores. By use of the method, the user behavior pattern is obtained from user original messy tracking data, daily behavior rules of the user can be revealed, and the possibility of cheat in traditional attendance checking is greatly reduced.

Description

Based on the Trustworthy user behaviour method that place is excavated
Technical field
The present invention relates to a kind of Trustworthy user behaviour method excavated based on place, belong to Data Mining.
Background technology
Along with the development of mobile Internet, mobile phone etc. moves equipment and popularizes gradually. The mobile equipment such as current mobile phone is provided with GPS, or has network positions function, facilitates user automatically to record the stroke of every day. User's different time sections every day residence time destribution in different location, reflects the Behavior law of this user.
Based on user trajectory data data mining technology constantly development in, it is typically employed in the fields such as popular place recommendation, the application in enterprise field is also fewer, for instance, 2013 " Kunming University of Science and Technology " disclosed user based on mobile phone location data goes on a journey law-analysing.
By digging user track data, enterprise can assess the work behavior of employee easily. This technology is not solely restricted to business administration, it is also possible to being applied in any needs track data to do the Trustworthy user behaviour field supported. But the examination employee's work performance outside of the existing traditional forms of enterprises is checked card generally by work attendance and realized, and this method needs manual maintenance record, the schemes such as fingerprint machine are adopted to also need to put into additional hardware cost, it is possible to the place of identification is also restrained.
Summary of the invention
It is an object of the invention to the problems referred to above overcoming prior art to exist, it is provided that a kind of Trustworthy user behaviour method excavated based on place. The present invention from the original mixed and disorderly track data of user, can obtain the behavioral pattern of user, and accurate response goes out the Behavior law of user's every day, greatly reduces traditional work attendance and checks card the possibility of in violation of rules and regulations cheating.
For achieving the above object, the technical solution used in the present invention is as follows:
A kind of Trustworthy user behaviour method excavated based on place, it is characterised in that: utilize the behavioral pattern of trajectory data mining user, analyze the Behavior law of user, user behavior is estimated.
Described method specifically includes following steps:
A, acquisition positional information obtain track data, and to track data prediction;
B, by track data obtain user's different time sections Annual distribution in different location, obtain the behavioral pattern of user;
C, utilize the historical record of user behavior pattern to update user preferences modeling, determine whether Deviant Behavior according to user preferences modeling, calculate user behavior score.
In described step a, mobile equipment reports track data to be L={l1,l2,…,ln, wherein li=(lati,longi,timei) represent longitude and latitude and time, first remove and track data repeats a little, again through Kalman filter rate of filtration abnormity point, smooth track data, make track data closer to real travel path.
In described step b, adopt based on seasonal effect in time series clustering algorithm, obtain user's different time sections Annual distribution in different location, obtain the behavioral pattern of user.
Described step b specifically includes:
B1, choose two parameter value place maximum magnitude DmaxWith effective place time span T;
B2, successively track data being carried out following process: when the distance of adjacent two tracing points is less than place range threshold D, two tracing points merge into a new tracing point, new tracing point participates in processing next time; When the distance of adjacent two tracing points is more than place range threshold DmaxTime, and the time span of previous tracing point more than effective place time threshold T time, this tracing point is an effective place, represent p={lat, lng, start_ts, end_ts};
B3, user count out as M effectively, within one day, are divided into N number of time period, and user behavior pattern is expressed as M × N matrix P=[fij], every a line represents certain effective place of user, and certain time period in one day, f are shown in each listijExpression rests on the probability in i-th place in the jth time period.
In described step c, user preferences modeling is drawn by following method:
C1, by Cosine coefficient, define user behavior pattern distance function. For behavioral pattern X and behavioral pattern Y, the place distribution vector of i-th time period is Xi={ x1,x2,…,xMAnd Yi={ y1,y2,…,yM, M is for effectively to count out, and N is time period sum, then have
d ( X i , Y i ) = Σ i = 1 M x i y i Σ i = 1 M x i 2 Σ i = 1 M y i 2
d ( X , Y ) = Σ i = 1 N d ( X i , Y i ) N
C2, utilize behavioral pattern distance function, the historical record of user behavior pattern is carried out DBSCAN cluster, obtains K classification, take the meansigma methods of same class behavioral pattern as class center, then this K behavioral pattern is user preferences modeling.
In described step c, Deviant Behavior is determined whether: utilize behavioral pattern distance function to calculate the similarity of user behavior pattern and user preferences modeling according to user preferences modeling, when similarity is lower than threshold value, the behavior judging user day is Deviant Behavior, then this user behavior score is directly judged to negative point.
In described step c, choose C class evaluation index, C class evaluation criterion weight in conjunction with customer service behavioral data W = { w 1 , w 2 , ... , w C } , Σ i = 1 C w i = 1 , , By S = Σ i = 1 C w i s i Calculate user behavior score, wherein siFor single item evaluation index score, draw assessment result according to user behavior score.
Described evaluation index selects user to move always distance Len, user dwell times Count, user and effectively stops number ECount, and effectively stopping number is the dwell point number having service data manipulating at stop site user.
Employing it is an advantage of the current invention that:
1, adopt after the present invention, it is not necessary to use extra work attendance to check card equipment, reduce deployment expense, be conducive to enterprise to promote the use of.
2, adopt after the present invention, it is possible to from the original mixed and disorderly track data of user, obtaining the behavioral pattern of user, accurate response goes out the Behavior law of user's every day, greatly reduce traditional work attendance and check card the possibility of cheating in violation of rules and regulations.
3, the present invention is by conjunction with user's historical behavior pattern, it is judged that user's Deviant Behavior.
4, the present invention calculates user behavior score according to selected evaluation index, sets up unified evaluation criterion, objectively responds out process of work and the work efficiency of user.
Accompanying drawing explanation
Fig. 1 is schematic flow sheet of the present invention
Fig. 2 is track data of the present invention and effective place schematic diagram
Detailed description of the invention
Embodiment 1
A kind of Trustworthy user behaviour method excavated based on place, it is characterised in that: utilize the behavioral pattern of trajectory data mining user, analyze the Behavior law of user, user behavior is estimated.
Described method specifically includes following steps:
A, acquisition positional information obtain track data, and to track data prediction;
B, by track data obtain user's different time sections Annual distribution in different location, obtain the behavioral pattern of user;
C, utilize the historical record of user behavior pattern to update user preferences modeling, determine whether Deviant Behavior according to user preferences modeling, calculate user behavior score.
In described step a, mobile equipment reports track data to be L={l1,l2,…,ln, wherein li=(lati,longi,timei) represent longitude and latitude and time, first remove and track data repeats a little, again through Kalman filter rate of filtration abnormity point, smooth track data, make track data closer to real travel path.
In described step b, adopt based on seasonal effect in time series clustering algorithm, obtain user's different time sections Annual distribution in different location, obtain the behavioral pattern of user.
Described step b specifically includes:
B1, choose two parameter value place maximum magnitude DmaxWith effective place time span T;
B2, successively track data being carried out following process: when the distance of adjacent two tracing points is less than place range threshold D, two tracing points merge into a new tracing point, new tracing point participates in processing next time; When the distance of adjacent two tracing points is more than place range threshold DmaxTime, and the time span of previous tracing point more than effective place time threshold T time, this tracing point is an effective place, represent p={lat, lng, start_ts, end_ts};
B3, user count out as M effectively, within one day, are divided into N number of time period, and user behavior pattern is expressed as M × N matrix P=[fij], every a line represents certain effective place of user, and certain time period in one day, f are shown in each listijExpression rests on the probability in i-th place in the jth time period.
Described step c specifically includes:
C1, by Cosine coefficient, define user behavior pattern distance function. For behavioral pattern X and behavioral pattern Y, the place distribution vector of i-th time period is Xi={ x1,x2,…,xMAnd Yi={ y1,y2,…,yM, M is for effectively to count out, and N is time period sum, then have
d ( X i , Y i ) = Σ i = 1 M x i y i Σ i = 1 M x i 2 Σ i = 1 M y i 2
d ( X , Y ) = Σ i = 1 N d ( X i , Y i ) N
C2, utilize behavioral pattern distance function, the historical record of the behavioral pattern of user is carried out DBSCAN cluster, obtains K classification, take the meansigma methods of same class behavioral pattern as class center, then this K behavioral pattern is user preferences modeling;
C3, determine whether Deviant Behavior according to user preferences modeling: utilize behavioral pattern distance function to calculate the similarity of user behavior pattern and user preferences modeling, when similarity is lower than threshold value, the behavior judging user day is Deviant Behavior, then this user behavior score is directly judged to negative point;
C3, choose C class evaluation index, evaluation criterion weight in conjunction with customer service behavioral data W = { w 1 , w 2 , ... , w C } , Σ i = 1 C w i = 1 , , By S = Σ i = 1 C w i s i Calculating user behavior score, wherein si is single item evaluation index score, draws assessment result according to user behavior score.
Assessment result is, is reflected level of effort and the efficiency of user by behavior score.
Described evaluation index selects user to move always distance Len, user dwell times Count, user and effectively stops number ECount, and effectively stopping number is the dwell point number having service data manipulating at stop site user.
Embodiment 2
A kind of Trustworthy user behaviour method excavated based on place is applied in infrastructure management company management security personnel, and security personnel needs at some places specified inspection time enough every day, and needs patrol certain number of times every day.By behavior appraisal procedure, it is possible to assessed the working condition of security personnel by the mark finally obtained. The method comprises the following steps:
The mobile equipment such as a, the smart mobile phone carried with by ensuring public security obtain positional information and obtain track data, and to track data prediction;
B, the different time sections Annual distribution in different location of being ensured public security by track data acquisition, obtain the behavioral pattern of security personnel;
C, utilize the historical record of security personnel's behavioral pattern to update user preferences modeling, determine whether Deviant Behavior according to user preferences modeling, calculate user behavior score.
In described step a, mobile equipment reports track data to be L={l1,l2,…,ln, wherein li=(lati,longi,timei) represent longitude and latitude and timestamp. First remove and track data repeats a little, again through Kalman filter rate of filtration abnormity point smooth track data, make track data closer to real travel path. Pretreated track data is as shown in the table:
Table 1: user trajectory data
In described step b, adopt based on seasonal effect in time series clustering algorithm, obtain security personnel's different time sections Annual distribution in different location, obtain the behavioral pattern of user.
Described step b specifically includes:
B1, choose place maximum magnitude be 100 meters and effectively place time span be 6 minutes;
B2, successively track data being carried out following process: when the distance of adjacent two tracing points is less than place range threshold 100 meters, two tracing points merge into a new tracing point, new tracing point participates in processing next time; When the distance of adjacent two tracing points is more than place range threshold 100 meters, and the time span of previous tracing point more than effective place time threshold 6 minutes time, this tracing point is an effective place, is expressed as p={lat, lng, start_ts, end_ts};
B3, user count out as M effectively, within one day, are divided into 24 time periods, and user behavior pattern is expressed as M × 24 matrix P=[fij], every a line represents certain effective place of user, and certain time period in one day, f are shown in each listijExpression rests on the probability in i-th place in the jth time period,One day behavioral pattern of user is as shown in the table:
Table 2: user behavior pattern
Described step c specifically includes:
C1, by Cosine coefficient, define user behavior pattern distance function. For behavioral pattern X and behavioral pattern Y, the place distribution vector of i-th time period is Xi={ x1,x2,…,xMAnd Yi={ y1,y2,…,yM, M is for effectively to count out, and N is time period sum, then have
d ( X i , Y i ) = Σ i = 1 M x i y i Σ i = 1 M x i 2 Σ i = 1 M y i 2
d ( X , Y ) = Σ i = 1 N d ( X i , Y i ) N
C2, utilize behavioral pattern distance function, the historical record of the behavioral pattern of user is carried out DBSCAN cluster, obtains K classification, take the meansigma methods of same class behavioral pattern as class center, then this K behavioral pattern is user preferences modeling;
C3, determine whether Deviant Behavior according to user preferences modeling: utilize behavioral pattern distance function to calculate the similarity of user behavior pattern and user preferences modeling, when similarity is lower than threshold value 0.3, it is judged that the behavior on user same day is Deviant Behavior;
C4, choose mobile total distance Dist, effective dwell point number ECount, cycle patrol times N period is as 3 evaluation indexes, wherein displacement Dist is the distance summation of consecutive points in track sets, and effective dwell point number ECount is the number resting on the place specified and the time of staying more than 30 minutes, and cycle patrol times N period is the number of times completing work in all appointed places, evaluation criterion weight W={0.2,0.3,0.5}, byCalculate user behavior score, wherein s i = 100 * N i Normal i , N i ≤ Normal i 100 , N i > Normal i , NiFor user's statistical value on index i, NormaliFor the index i standard value preset.Then:
When score is more than 80, reflect that this employee completes work well.
When score is more than 60, reflects that this employee is basically completed work, but completeness is not high
When score is less than 60, reflect that this employee is not properly completed work.

Claims (9)

1. the Trustworthy user behaviour method excavated based on place, it is characterised in that: utilize the behavioral pattern of trajectory data mining user, analyze the Behavior law of user, user behavior is estimated.
2. the Trustworthy user behaviour method excavated based on place according to claim 1, it is characterised in that: described method specifically includes following steps:
A, acquisition positional information obtain track data, and to track data prediction;
B, by track data obtain user's different time sections Annual distribution in different location, obtain the behavioral pattern of user;
C, utilize the historical record of user behavior pattern to update user preferences modeling, determine whether Deviant Behavior according to user preferences modeling, calculate user behavior score.
3. the Trustworthy user behaviour method excavated based on place according to claim 2, it is characterised in that: in described step a, mobile equipment reports track data to be L={l1,l2..., ln, wherein li=(lati,longi,timei) represent longitude and latitude and time, first remove and track data repeats a little, again through Kalman filter rate of filtration abnormity point, smooth track data, make track data closer to real travel path.
4. the Trustworthy user behaviour method excavated based on place according to claim 3, it is characterized in that: in described step b, adopt based on seasonal effect in time series clustering algorithm, obtain user's different time sections Annual distribution in different location, obtain the behavioral pattern of user.
5. the Trustworthy user behaviour method excavated based on place according to claim 4, it is characterised in that: described step b specifically includes:
B1, choose two parameter value place maximum magnitude DmaxWith effective place time span T;
B2, successively track data being carried out following process: when the distance of adjacent two tracing points is less than place range threshold D, two tracing points merge into a new tracing point, new tracing point participates in processing next time; When the distance of adjacent two tracing points is more than place range threshold DmaxTime, and the time span of previous tracing point more than effective place time threshold T time, this tracing point is an effective place, is expressed as p={lat, lng, start_ts, end_ts};
B3, user count out as M effectively, within one day, are divided into N number of time period, and user behavior pattern is expressed as M × N matrix P=[fij], every a line represents certain effective place of user, and certain time period in one day, f are shown in each listijExpression rests on the probability in i-th place in the jth time period.
6. the Trustworthy user behaviour method excavated based on place according to claim 5, it is characterised in that: in described step c, user preferences modeling is drawn by following method:
C1, by Cosine coefficient, define user behavior pattern distance function. For behavioral pattern X and behavioral pattern Y, the place distribution vector of i-th time period is Xi={ x1,x2,...,xMAnd Yi={ y1,y2,...,yM, M is for effectively to count out, and N is time period sum, then have
d ( X i , Y i ) = Σ i = 1 M x i y i Σ i = 1 M x i 2 Σ i = 1 M y i 2
d ( X , Y ) = Σ i = 1 N d ( X i , Y i ) N
C2, utilize behavioral pattern distance function, the historical record of user behavior pattern is carried out DBSCAN cluster, obtains K classification, take the meansigma methods of same class behavioral pattern as class center, then this K behavioral pattern is user preferences modeling.
7. the Trustworthy user behaviour method excavated based on place according to claim 6, it is characterized in that: in described step c, Deviant Behavior is determined whether: utilize behavioral pattern distance function to calculate the similarity of user behavior pattern and user preferences modeling according to user preferences modeling, when similarity is lower than threshold value, the behavior judging user day is Deviant Behavior, then this user behavior score is directly judged to negative point.
8. the Trustworthy user behaviour method excavated based on place according to claim 7, it is characterised in that: in described step c, choose C class evaluation index, C class evaluation criterion weight W={w in conjunction with customer service behavioral data1,w2,…,wC,ByCalculate user behavior score, wherein siFor single item evaluation index score, draw assessment result according to user behavior score.
9. the Trustworthy user behaviour method excavated based on place according to claim 8, it is characterized in that: described evaluation index selects user to move always distance Len, user dwell times Count, user and effectively stops number ECount, effectively stopping number is the dwell point number having service data manipulating at stop site user.
CN201610006088.7A 2016-01-06 2016-01-06 Method for evaluating user behavior on the basis of position mining Pending CN105678457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610006088.7A CN105678457A (en) 2016-01-06 2016-01-06 Method for evaluating user behavior on the basis of position mining

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610006088.7A CN105678457A (en) 2016-01-06 2016-01-06 Method for evaluating user behavior on the basis of position mining

Publications (1)

Publication Number Publication Date
CN105678457A true CN105678457A (en) 2016-06-15

Family

ID=56298981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610006088.7A Pending CN105678457A (en) 2016-01-06 2016-01-06 Method for evaluating user behavior on the basis of position mining

Country Status (1)

Country Link
CN (1) CN105678457A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127400A (en) * 2016-06-29 2016-11-16 北京奇虎科技有限公司 Work behavior analyzes method and device
CN106296065A (en) * 2016-07-21 2017-01-04 北京京东尚科信息技术有限公司 The monitoring method of order correct-distribute based on GIS technology exception, Apparatus and system
CN106384120A (en) * 2016-08-29 2017-02-08 深圳先进技术研究院 Mobile phone positioning data based resident activity pattern mining method and device
CN106407519A (en) * 2016-08-31 2017-02-15 浙江大学 Modeling method for crowd moving rule
CN106570160A (en) * 2016-11-04 2017-04-19 北方工业大学 Mass spatio-temporal data cleaning method and mass spatio-temporal data cleaning device
CN107093085A (en) * 2016-08-19 2017-08-25 北京小度信息科技有限公司 Abnormal user recognition methods and device
CN107395562A (en) * 2017-06-14 2017-11-24 广东网金控股股份有限公司 A kind of financial terminal security protection method and system based on clustering algorithm
CN108492023A (en) * 2018-03-19 2018-09-04 浙江工业大学 A kind of vehicle loan air control method based on trajectory analysis
CN108632097A (en) * 2018-05-14 2018-10-09 平安科技(深圳)有限公司 Recognition methods, terminal device and the medium of abnormal behaviour object
CN109697595A (en) * 2017-10-20 2019-04-30 杭州海康威视系统技术有限公司 The recognition methods of cheating attendance data and device, storage medium, computer equipment
CN110160539A (en) * 2019-05-28 2019-08-23 北京百度网讯科技有限公司 Map-matching method, calculates equipment and medium at device
CN110796758A (en) * 2019-10-24 2020-02-14 西安瑞特森信息科技有限公司 Forest protection inspection method based on mobile GIS
CN110969405A (en) * 2019-10-24 2020-04-07 西安瑞特森信息科技有限公司 Mobile GIS-based forest protection positioning and attendance checking calculation method
CN110990722A (en) * 2019-12-19 2020-04-10 南京柏跃软件有限公司 Fuzzy co-station analysis algorithm model based on big data mining and analysis system thereof
CN111984634A (en) * 2019-05-22 2020-11-24 中国移动通信集团山西有限公司 Alarm transaction extraction method, device, equipment and computer storage medium
CN112685618A (en) * 2019-10-17 2021-04-20 中国移动通信集团浙江有限公司 User feature identification method and device, computing equipment and computer storage medium
CN113379366A (en) * 2021-04-27 2021-09-10 福建依时利软件股份有限公司 Campus positioning attendance management method, device, equipment and medium
TWI844757B (en) * 2021-01-15 2024-06-11 遠傳電信股份有限公司 System and method for tracking life footprints

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629297A (en) * 2012-03-06 2012-08-08 北京建筑工程学院 Traveler activity rule analysis method based on stroke recognition
CN104850604A (en) * 2015-05-04 2015-08-19 华中科技大学 Tensor-based user track mining method
CN104933157A (en) * 2015-06-26 2015-09-23 百度在线网络技术(北京)有限公司 Method and device used for obtaining user attribute information, and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102629297A (en) * 2012-03-06 2012-08-08 北京建筑工程学院 Traveler activity rule analysis method based on stroke recognition
CN104850604A (en) * 2015-05-04 2015-08-19 华中科技大学 Tensor-based user track mining method
CN104933157A (en) * 2015-06-26 2015-09-23 百度在线网络技术(北京)有限公司 Method and device used for obtaining user attribute information, and server

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127400A (en) * 2016-06-29 2016-11-16 北京奇虎科技有限公司 Work behavior analyzes method and device
CN106296065A (en) * 2016-07-21 2017-01-04 北京京东尚科信息技术有限公司 The monitoring method of order correct-distribute based on GIS technology exception, Apparatus and system
CN107093085A (en) * 2016-08-19 2017-08-25 北京小度信息科技有限公司 Abnormal user recognition methods and device
CN106384120A (en) * 2016-08-29 2017-02-08 深圳先进技术研究院 Mobile phone positioning data based resident activity pattern mining method and device
CN106384120B (en) * 2016-08-29 2019-08-23 深圳先进技术研究院 A kind of resident's activity pattern method for digging and device based on mobile phone location data
CN106407519B (en) * 2016-08-31 2019-04-16 浙江大学 A kind of modeling method of crowd's movement law
CN106407519A (en) * 2016-08-31 2017-02-15 浙江大学 Modeling method for crowd moving rule
CN106570160A (en) * 2016-11-04 2017-04-19 北方工业大学 Mass spatio-temporal data cleaning method and mass spatio-temporal data cleaning device
CN106570160B (en) * 2016-11-04 2020-06-26 北方工业大学 Method and device for cleaning massive space-time data
CN107395562A (en) * 2017-06-14 2017-11-24 广东网金控股股份有限公司 A kind of financial terminal security protection method and system based on clustering algorithm
CN109697595A (en) * 2017-10-20 2019-04-30 杭州海康威视系统技术有限公司 The recognition methods of cheating attendance data and device, storage medium, computer equipment
CN109697595B (en) * 2017-10-20 2020-11-27 杭州海康威视系统技术有限公司 Method and device for identifying attendance data, storage medium and computer equipment
CN108492023A (en) * 2018-03-19 2018-09-04 浙江工业大学 A kind of vehicle loan air control method based on trajectory analysis
CN108632097B (en) * 2018-05-14 2019-12-13 平安科技(深圳)有限公司 Abnormal behavior object identification method, terminal device and medium
WO2019218475A1 (en) * 2018-05-14 2019-11-21 平安科技(深圳)有限公司 Method and device for identifying abnormally-behaving subject, terminal device, and medium
CN108632097A (en) * 2018-05-14 2018-10-09 平安科技(深圳)有限公司 Recognition methods, terminal device and the medium of abnormal behaviour object
CN111984634A (en) * 2019-05-22 2020-11-24 中国移动通信集团山西有限公司 Alarm transaction extraction method, device, equipment and computer storage medium
CN111984634B (en) * 2019-05-22 2023-07-21 中国移动通信集团山西有限公司 Alarm transaction extraction method, device, equipment and computer storage medium
CN110160539A (en) * 2019-05-28 2019-08-23 北京百度网讯科技有限公司 Map-matching method, calculates equipment and medium at device
CN112685618A (en) * 2019-10-17 2021-04-20 中国移动通信集团浙江有限公司 User feature identification method and device, computing equipment and computer storage medium
CN110796758A (en) * 2019-10-24 2020-02-14 西安瑞特森信息科技有限公司 Forest protection inspection method based on mobile GIS
CN110969405A (en) * 2019-10-24 2020-04-07 西安瑞特森信息科技有限公司 Mobile GIS-based forest protection positioning and attendance checking calculation method
CN110990722A (en) * 2019-12-19 2020-04-10 南京柏跃软件有限公司 Fuzzy co-station analysis algorithm model based on big data mining and analysis system thereof
TWI844757B (en) * 2021-01-15 2024-06-11 遠傳電信股份有限公司 System and method for tracking life footprints
CN113379366A (en) * 2021-04-27 2021-09-10 福建依时利软件股份有限公司 Campus positioning attendance management method, device, equipment and medium
CN113379366B (en) * 2021-04-27 2024-04-09 福建依时利软件股份有限公司 Campus positioning attendance management method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN105678457A (en) Method for evaluating user behavior on the basis of position mining
CN105354196B (en) Information-pushing method and information push-delivery apparatus
CN110400215B (en) Method and system for constructing enterprise family-oriented small micro enterprise credit assessment model
CN108924333A (en) Fraudulent call recognition methods, device and system
CN105678481A (en) Pipeline health state assessment method based on random forest model
CN104331502B (en) The recognition methods of courier's data in being marketed for courier periphery crowd
CN111709714B (en) Loss personnel prediction method and device based on artificial intelligence
CN105574593A (en) Track state static-state detection and control system and method based on cloud computing and big data
CN107292517A (en) The civil aviaton's security information service system analyzed based on big data
Saliminejad et al. A spatial‐Bayesian technique for imputing pavement network repair data
CN114418175A (en) Personnel management method and device, electronic equipment and storage medium
CN109740044B (en) Enterprise transaction early warning method based on time series intelligent prediction
CN110400124A (en) Attendance monitoring system and method and computer readable storage medium
Qi et al. Vehicle trajectory reconstruction on urban traffic network using automatic license plate recognition data
CN105741161A (en) Method and system for recognizing click farming users in taxi businesses on basis of driver credit
CN110162958A (en) For calculating the method, apparatus and recording medium of the synthesis credit score of equipment
CN117238126A (en) Traffic accident risk assessment method under continuous flow road scene
CN107093018A (en) Communication engineering project information method for visualizing and device based on health model
CN113379211B (en) Logistics information platform default risk management and control system and method based on blockchain
CN116167661A (en) Land utilization change simulation credibility assessment method based on space dislocation
CN115271514A (en) Communication enterprise monitoring method and device, electronic equipment and storage medium
CN114897345A (en) Method and device for automatically generating index scores based on employee data
CN109035006A (en) The method and its system of risk monitoring and control after a kind of loan
CN102096692A (en) System and method for evaluating values of website visitors
Xu et al. Metro train operation plan analysis based on station travel time reliability

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 610000, No. 10, 4 floor, No. 88, 16 and two street, Chengdu high tech Zone, Sichuan, China

Applicant after: CHENGDU XIAOBU CHUANGXIANG CHANGLIAN TECHNOLOGY CO., LTD.

Address before: 610000, Chengdu, Sichuan, Wuhou District Province, Wu Xing Road, four West Chi Valley D District

Applicant before: CHENGDU XIAOBU CHUANGXIANG CHANGLIAN TECHNOLOGY CO., LTD.

COR Change of bibliographic data
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20181121

Address after: 610000 First Floor, 219 Tianshun Road, Chengdu High-tech Zone, Sichuan Province

Applicant after: Chengdu small Hui creators science and Technology Co.

Address before: 610000 No. 16, 10th floor, 4th floor, 88 Guanghe Second Street, Chengdu High-tech Zone, Sichuan Province

Applicant before: CHENGDU XIAOBU CHUANGXIANG CHANGLIAN TECHNOLOGY CO., LTD.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160615