Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3468920.3468929acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdeConference Proceedingsconference-collections
research-article

User Portrait Technology and its Application Scenario Analysis

Published: 24 August 2021 Publication History

Abstract

With the rapid development of big data,it has become a trend to use user portrait technology to transform user information into specific tags, to embody the image of users, and to provide users with personalized services. This article introduces the creation process of user portrait in detail, explains the analysis method of portrait accuracy, and summarizes and analyzes the typical application scenarios of user portrait technology.

References

[1]
Cooper A. The Inmates are Running the Asylum: Why High-Tech Products Drive Us Crazy and How to Restore the Sanity[M]. Sams Publishing, 2004.
[2]
Y. Jia, K. Chao, X. Cheng, M. Yuan and M. Mu, "Big data based user clustering and influence power ranking," 2016 16th International Symposium on Communications and Information Technologies (ISCIT), Qingdao, 2016, pp. 371-375.
[3]
Zi Yunfei,Li Yeli,Sun Huayan. Research of personalized recommendation system based on deep neural network[J]. Dianzi Jishu Yingyong,2019,45(1).
[4]
Subedi B, Alsadoon A, Prasad P, Alsadoon OH, Haddad S, Alrubaie A. A novel optimized initial cluster center and enhanced objective function: Medical diagnosis through classification. Health Informatics Journal. 2020;26(1):539-562.
[5]
Xu Hailing, Zhang Haitao, Zhang Xiaohui, Wei Mingzhu. Research on the interest portrait of university library group users based on concept lattice[J]. Information Science, 2019, 37(09): 153-158+176.
[6]
T. Kulkarni, M. Kabra and R. Shankarmani, "User Profiling Based Recommendation System for E-Learning," 2019 IEEE 16th India Council International Conference (INDICON), Rajkot, India, 2019, pp. 1-4.
[7]
Liu Jianguo, Zhou Tao, Guo Qiang, Wang Binghong. Overview of evaluation methods for personalized recommendation systems[J]. Complex Systems and Complexity Science, 2009, 6(03):1-10.
[8]
E. Ishukova, V. Salmanov, A. Kalyabin and A. Antonenko, "Approaches to Construct a Psychological Portrait of Users Based on Analysis of Data in Open Profiles of Social Networks," 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russia, 2019, pp. 537-539
[9]
Zhao Xiaoyu, Huang Xiaoyuan, Cao Zhongpeng. A collaborative filtering recommendation method based on customer transaction data[J]. Journal of Northeastern University: Natural Science Edition, 2009(12): 1792-1795.
[10]
Zhong Wei, Li Zhichen. Research on Network Education System Based on Machine Learning [J]. Journal on Communications, 2018, 39(S1): 135-140.
[11]
D. Xu, Y. Wang, Y. Meng and Z. Zhang, "An Improved Data Anomaly Detection Method Based on Isolation Forest," 2017 10th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, 2017, pp. 287-291.
[12]
W. Zhang and L. Chen, "Web Log Anomaly Detection Based on Isolated Forest Algorithm," 2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), Dalian, China, 2019, pp. 755-759.
[13]
Riloff, Ellen. Automatically constructing a dictionary for information extraction tasks. in Processing of AAAI-2003. 1993.
[14]
Riloff, Ellen. Automatically generating extraction patterns from untagged text. in Proceedings of AAAI-1996. 1996.
[15]
F. Ciravegna. An adaptive algorithm for information extraction from web-related texts. In Proc. of IJCAI’01 Workshop, August 2001.
[16]
S. Brin. Extracting Patterns and Relations from the World Wide Web. In WebDB Workshop at 6th International Conference on Extending Database Technology, EDBT’98, pages 172–183, Valencia, Spain, 1998.
[17]
Heike Adel, Benjamin Roth, and Hinrich Schutze. ¨ 2016. Comparing convolutional neural networks to traditional models for slot filling. In Proc. NAACL2016.
[18]
Tan Hao, Guo Yating. The method and application of user portrait construction based on big data[J]. Packaging Engineering, 2019, 40(22): 95-101.
[19]
Li Na, Fan Zhengjie, Hao Chuanzhou, Wang Pinghui, Tao Jing, Lin Jie. A method of constructing a label system using semantic analysis [J]. Journal of Xi'an Jiaotong University, 2019, 53(01): 169-174.
[20]
Han Meihua, Zhao Jingxiu. Research on the Reading Therapy Model Based on "User Portrait"——Take Depression as an Example [J]. Journal of University Libraries, 2017, 35(06): 105-110.
[21]
L.M. de Campos, J.M. Fernández-Luna, J.F. Huete, L. Redondo-Expósito, Automatic construction of multi-faceted user profiles using text clustering and its application to expert recommendation and filtering problems, Knowledge-Based Systems 190, article number 105337, 2020.
[22]
Pablo Pérez-Núñez,Oscar Luaces,Antonio Bahamonde,Jorge Díez. Improving recommender systems by encoding items and user profiles considering the order in their consumption history[J]. Progress in Artificial Intelligence,2020,9(1).
[23]
Wang Yang, Ding Zhigang, Zheng Shuquan, Qi Wenxiu. Design and implementation of a user portrait system[J]. Computer Applications and Software, 2018, 35(03): 8-14.
[24]
S. OUAFTOUH, I. SASSI, A. ZELLOU and S. ANTER, "Flat and hierarchical user profile clustering in an e-commerce recommender system," 2019 1st International Conference on Smart Systems and Data Science (ICSSD), Rabat, Morocco, 2019, pp. 1-5.
[25]
"Cihai of Mathematics" Editor-in-Chief Committee. "The Dictionary of Mathematics" Volume 3: Southeast University Press, 2002
[26]
F. T. Liu, K. M. Ting and Z. Zhou, "Isolation Forest," 2008 Eighth IEEE International Conference on Data Mining, Pisa, 2008, pp. 413-422.
[27]
Jin Yan, Sun Jiajia. UGC quality prediction model based on user profile[J]. Information Theory and Practice, 2019, 42(10): 77-83.
[28]
D. Xu, Y. Wang, Y. Meng and Z. Zhang, "An Improved Data Anomaly Detection Method Based on Isolation Forest," 2017 10th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, 2017, pp. 287-291.
[29]
Xuesheng Lai,Lili He,Qingyan Zhou. Personalized Product Service Recommendation Based on User Portrait Mathematical Model[A]. Wuhan Zhicheng Times Cultural Development Co.,Ltd.Proceedings of the 2018 International Symposium on Communication Engineering & Computer Science(CECS 2018)[C].Wuhan Zhicheng Times Cultural Development Co.,Ltd:Wuhan Zhicheng Times Cultural Development Co.,Ltd,2018:6.
[30]
Hong Liang, Ren Qiuyu, Liang Shuxian. Comparative Research on the Information Service Quality of Domestic E-commerce Website Recommendation System——Taking Taobao, Jingdong and Amazon as Examples [J]. Library and Information Service, 2016, 60(23): 97-110 .
[31]
Yuan Sha, Tang Jie, Gu Xiaotao. Overview of Scholar Portrait Technology in the Open Internet [J]. Computer Research and Development, 2018, 55(09): 1903-1919.
[32]
Chen Tianyuan. Empirical study on the construction of user portraits in university mobile libraries[J]. Library and Information Service, 2018, 62(07): 38-46.
[33]
Xu Hailing, Zhang Haitao, Zhang Xiaohui, Wei Mingzhu. Research on the Interest Profile of University Library Group Users Based on Concept Lattice [J]. Information Science, 2019, 37(09): 153-158+176.
[34]
Wang Zhixiang. Research on accurate recommendation of medical information based on user portraits [D]. University of Electronic Science and Technology of China, 2016.

Cited By

View all
  • (2024)Research on the Application of Knowledge Graph in Demand-Side Flexible Resource Profiling and Aggregation TechniquesApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-13319:1Online publication date: 3-Jun-2024
  • (2023)Notice the imposter! a study on user tag spoofing attack in mobile appsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620544(5485-5501)Online publication date: 9-Aug-2023
  • (2023)Research on Learner Portrait Based on xAPI and Learning Analysis2023 11th International Conference on Information and Education Technology (ICIET)10.1109/ICIET56899.2023.10111280(416-420)Online publication date: 18-Mar-2023

Index Terms

  1. User Portrait Technology and its Application Scenario Analysis
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        BDE '21: Proceedings of the 2021 3rd International Conference on Big Data Engineering
        May 2021
        175 pages
        ISBN:9781450389426
        DOI:10.1145/3468920
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 24 August 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. accuracy analysis
        2. big data
        3. user portraits
        4. user tags

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        BDE 2021

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)61
        • Downloads (Last 6 weeks)4
        Reflects downloads up to 01 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Research on the Application of Knowledge Graph in Demand-Side Flexible Resource Profiling and Aggregation TechniquesApplied Mathematics and Nonlinear Sciences10.2478/amns-2024-13319:1Online publication date: 3-Jun-2024
        • (2023)Notice the imposter! a study on user tag spoofing attack in mobile appsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620544(5485-5501)Online publication date: 9-Aug-2023
        • (2023)Research on Learner Portrait Based on xAPI and Learning Analysis2023 11th International Conference on Information and Education Technology (ICIET)10.1109/ICIET56899.2023.10111280(416-420)Online publication date: 18-Mar-2023

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media