博碩士論文 102423024 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:6 、訪客IP:35.171.45.91
姓名 林俊勇(Lim Chun Yeong)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 視窗環境下使用者行為獲取機制研究
(User Behavior Acquire Mechanism Under Windows Program Environment)
相關論文
★ 應用數位版權管理機制於數位影音光碟內容保護之研究★ 以應用程式虛擬化技術達成企業軟體版權管理之研究
★ 以IAX2為基礎之網頁電話架構設計★ 應用機器學習技術協助警察偵辦詐騙案件之研究
★ 網際網路半結構化資料之蒐集與整合研究★ 電子商務環境下網路購物幫手之研究
★ 網路安全縱深防護機制之研究★ 國家寬頻實驗網路上資源預先保留與資源衝突之研究
★ 以樹狀關聯式架構偵測電子郵件病毒之研究★ 考量地區差異性之隨選視訊系統影片配置研究
★ 不信任區域網路中數位證據保留之研究★ 入侵偵測系統事件說明暨自動增加偵測規則之整合性輔助系統研發
★ 利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究★ 一種網頁資訊擷取程式之自動化產生技術研發
★ 應用XML/XACML於工作流程管理系統之授權管制研究★ 快速建置SIP服務的設計與實作研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 蒐集使用者行為資訊以提供個人化的服務與提升服務品質已日漸重要,因此如何準確地獲取使用者於服務使用時的行為便成為重要的議題。目前在學術研究上已經有許多關於使用者行為獲取的機制與相關研究,其中最常見的作法為以圖像辨識方式獲取使用者行為,但其消耗CPU效能,且同時在圖像劇烈變化之下無法正確地辨識以及獲取使用者行為。目前多數相關研究的缺點是僅針對固定視窗大小進行辨識,且在多數常用的功能皆已提供快捷鍵情況下,目前研究並無提供辨識快捷鍵的功能。為改善這些缺點,本研究提出視窗環境下之使用者行為獲取機制研究,將應用程式的視窗以一個網格48x48的方式切割,並設定好每一個網格上代表的元件,以獲取使用者在應用程式上的行為。同時本研究亦提供自動重算視窗網格的改變,能即時獲取使用者行為。我們已在Windows作業系統上完成系統雛型,同時也進行了兩個實驗。實驗結果顯示本研究能正確地針對Windows以及GTK所開發的視窗程式進行辨識並獲取使用者行為。
摘要(英) With a collection of user behavior information to provide a personalized service and to improve the service quality has become increasingly important. How to accurately obtain user behavior when user using the service or application has become an important issue. Currently, in the academic study has a number of mechanisms related research on user behavior acquired. One of the most famous practice was image recognition for acquisition user behavior, but its consumption performance, and at the same time it can’t properly identify and obtain user behavior under the picture dramatically. In the majority of studies conducted to identify only for a fixed window size. On the other hand, the most commonly used functions have provide a hotkeys to greatly enhance user interaction with the GUI interface, but these studies didn’t provide identification and obtain what function is the hotkeys was press. To improve these shortcomings, our study presents a user behavior acquire mechanisms under windows program environment, to recognize the whole windows program to get the user behavior on the program’s window. At the same time, our study also provide an automatic recalculation adjusted of this specified location for the changes of the windows program location, so that it’s possible to automatically identify and capture the user behavior when user change the windows program size and click on the specified location or specified button. We have completed a prototype system on Windows Operating System, also carried out two experiments. The results show that can correctly against Windows and GTK programs identify and obtain user behavior.
關鍵字(中) ★ API Hooking
★ 使用者行為
★ 視窗縮放
★ 快捷鍵
★ 視窗網格
關鍵字(英) ★ API Hooking
★ User Behavior
★ Window Rescale
★ Hotkeys
★ Keyboard Shortcut
★ Window Grid
論文目次 論文摘要 i
Abstract ii
誌謝 iii
目錄 iv
圖目錄 vi
表目錄 viii
第一章 緒論 1
1-1 研究背景 1
1-2 研究動機與目的 4
1-3 研究貢獻 5
1-4 章節架構 5
第二章 相關研究 6
2-1 使用者行為的定義 6
2-2 使用者行為獲取方式 7
2-2-1 網頁或應用程式的使用者行為獲取方式 7
2-2-2 以追踪系統記錄檔為獲取方式 11
2-3 畫面辨識與視窗資訊獲取方式 12
2-4 快捷鍵 18
2-5 小結 19
第三章 視窗環境下使用者行為獲取機制 21
3-1 機制設計、架構與運作流程 21
3-1-1 機制設計之考量 21
3-1-2 視窗環境下使用者行為獲取機制之架構流程 23
3-2 模組功能詳述 25
3-2-1 鍵盤模組 25
3-2-2 滑鼠模組 27
3-2-3 操作資訊記錄模組 35
3-3 視窗環境下使用者行為獲取機制流程及擴充方式 36
3-4 系統移植探討 39
3-4-1 Linux移植的可能性 39
第四章 實驗與討論 44
4-1 實驗一:UBAM在視窗程式縮放及快捷鍵的功能性及準確度驗證 44
4-1-1 實驗目的 44
4-1-2 實驗環境與設計 44
4-1-3 實驗結果 45
4-2 實驗二:UBAM對系統效能的影響 48
4-2-1 實驗目的 48
4-2-2 實驗環境與設計 48
4-2-3 實驗結果 50
4-3 小結 53
第五章 結論與未來研究 54
5-1 研究結論與貢獻 54
5-2 研究限制 54
5-3 未來研究 55
參考文獻 57
附錄一 62
參考文獻 [1] “數位化/多螢匯流浪潮衝擊 閱聽眾收視調查機制大翻新 - 懂市場 - 新電子科技雜誌.” [Online]. Available: http://www.mem.com.tw/article_content.asp?sn=1303080006. [Accessed: 25-Mar-2015].
[2] J. Huang, R. W. White, and S. Dumais, “No clicks, no problem: Using cursor movements to understand and improve search,” Proc. 29th SIGCHI Conf. Hum. Factors Comput. Syst., p. 1225, 2011.
[3] Y. Zhang, W. Chen, D. Wang, and Q. Yang, “User-click modeling for understanding and predicting search-behavior,” Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discov. data Min. - KDD ’11, p. 1388, 2011.
[4] C. Xu, C. Du, G. F. Zhao, and S. Yu, “A novel model for user clicks identification based on hidden semi-Markov,” J. Netw. Comput. Appl., vol. 36, pp. 791–798, 2013.
[5] J. Teng, T. Y. Pan, Z. M. Zhu, and K. Lu, “A personalized recommendation model based on the user-state awareness,” Proc. - 2009 1st IEEE Symp. Web Soc. SWS 2009, pp. 10–13, 2009.
[6] “打好基本功 - YouTube.” [Online]. Available: http://www.youtube.com/yt/artists/zh-TW/master-the-basics.html. [Accessed: 30-Jun-2015].
[7] “Facebook Test Lets Users Pick Which Pages’ & Friends′ Posts Appear At Top Of News Feed.” [Online]. Available: http://marketingland.com/facebook-test-lets-users-pick-which-pages-friends-posts-appear-at-top-of-news-feed-127790. [Accessed: 30-Jun-2015].
[8] “Facebook Tests Feature Letting Users Pick Pages, Friends They’d Want To See Atop News Feed | SocialTimes.” [Online]. Available: http://www.adweek.com/socialtimes/facebook-tests-feature-letting-users-pick-pages-friends-theyd-want-to-see-atop-news-feed/619554. [Accessed: 30-Jun-2015].
[9] “EdgeRank成過去-探討Facebook動態消息演算法.” [Online]. Available: http://www.inboundjournals.com/edgerank-is-dead-facebooks-news-feed-algorithm-factors/. [Accessed: 30-Jun-2015].
[10] 資策會,“以電子商務推薦系統打造個人化數位學習服務。” [Online]. Available: http://newsletter.teldap.tw/news/HaveYourSayContent.php?nid=4653&lid=533.
[11] D. Van Den Poel and W. Buckinx, “Predicting online-purchasing behaviour,” Eur. J. Oper. Res., vol. 166, pp. 557–575, 2005.
[12] R. Atterer, M. Wnuk, and A. Schmidt, “Knowing the user’s every move: user activity tracking for website usability evaluation and implicit interaction,” Proc. 15th Int. Conf. World Wide Web, pp. 203–212, 2006.
[13] Y. M. Chen, C. E. Chuang, H. C. Liu, C. Y. Ni, and C. T. Wang, “Using agent in virtual machine for interactive security training,” Commun. Comput. Inf. Sci., vol. 259 CCIS, pp. 65–74, 2011.
[14] “中央大學雲端安全實驗平台.” [Online]. Available: http://csep.mgt.ncu.edu.tw/.
[15] 卿韻亭,「基於Windows API之實驗狀態回饋機制研究─以CSEP雲端安全實驗平台為例」,國立中央大學資訊管理學系碩士論文,2014。
[16] A. Keane and S. O’Shaughnessy, “Tracking user activity on personal computers,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng., vol. 88 LNICST, pp. 188–196, 2012.
[17] M. Claypool, P. Le, M. Wased, and D. Brown, “Implicit interest indicators,” Proc. 6th Int. Conf. Intell. user interfaces - IUI ’01, pp. 33–40, 2001.
[18] T. Yeh, T.-H. Chang, and R. C. Miller, “Sikuli: using GUI screenshots for search and automation,” Proc. 22nd Annu. ACM Symp. User interface Softw. Technol., no. Figure 1, pp. 183–192, 2009.
[19] A. Hurst, S. E. Hudson, and J. Mankoff, “Automatically identifying targets users interact with during real world tasks,” Proc. 15th Int. Conf. Intell. user interfaces, pp. 11–20, 2010.
[20] T. Grossman, P. Dragicevic, and R. Balakrishnan, “Strategies for accelerating on-line learning of hotkeys,” Proc. SIGCHI Conf. Hum. factors Comput. Syst. - CHI ’07, pp. 1591–1600, 2007.
[21] “Oxford Learner’s Dictionaries.” [Online]. Available: http://www.oxfordlearnersdictionaries.com/. [Accessed: 02-Jul-2015].
[22] S. Pachidi, M. Spruit, and I. Van De Weerd, “Understanding users’ behavior with software operation data mining,” Comput. Human Behav., vol. 30, pp. 583–594, 2014.
[23] J. A. Castañeda, F. Muñoz-Leiva, and T. Luque, “Web Acceptance Model (WAM): Moderating effects of user experience,” Inf. Manag., vol. 44, no. 4, pp. 384–396, 2007.
[24] F. Muñoz-Leiva, “Generalising user behaviour in online travel sites through the Travel 2.0 website acceptance model,” Online Inf. Rev., vol. 36, no. 6, pp. 879–902, 2012.
[25] R. N. Schwartz and J. L. Plass, “Click versus drag: User-performed tasks and the enactment effect in an interactive multimedia environment,” Comput. Human Behav., vol. 33, pp. 242–255, 2014.
[26] T. Marsh, S. P. Smith, K. Yang, and C. Shahabi, “Continuous and Unobtrusive Capture of User-Player Behaviour and Experience to Assess and Inform Game Design and Development,” Proc. 2006 ACM SIGGRAPH Symp. Videogames, pp. 1–8, 2006.
[27] L. a. Leiva and J. Huang, “Building a better mousetrap: Compressing mouse cursor activity for web analytics,” Inf. Process. Manag., vol. 51, no. 2, pp. 114–129, 2015.
[28] “Website Heatmap & Session Replay Tool - Mouseflow.” [Online]. Available: https://mouseflow.com/. [Accessed: 05-Jul-2015].
[29] “Click Tale.” [Online]. Available: http://www.clicktale.com/. [Accessed: 05-Jul-2015].
[30] Microsoft, “Introdcuting Spy++.” [Online]. Available: http://msdn.microsoft.com/en-us/library/dd460756.aspx.
[31] “AHKinfo 窗口信息工具.” [Online]. Available: http://ahk8.com/thread-4010.html. [Accessed: 26-Mar-2015].
[32] S. . Malacria, G. . Bailly, J. . Harrison, A. . Cockburn, and C. . Gutwin, “Promoting hotkey use through rehearsal with ExposeHK,” Conf. Hum. Factors Comput. Syst. - Proc., pp. 573–582, 2013.
[33] S. K. Card, T. P. Moran, and A. Newel, “The Keystroke-Level Model for User Performance Time with Interactive Ssystems,” Communications of the ACM Volume 23 Issue 7, pp. 396–410, Jul-1980.
[34] D. L. Odell, R. C. Davis, a Smith, and P. K. Wright, “Toolglasses, marking menus, and hotkeys: a comparison of one and two-handed command selection techniques,” Proc. Graph. Interface - GI ’04, pp. 17–24, 2004.
[35] “Icons (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/dn742485(v=vs.85).aspx. [Accessed: 14-Jun-2015].
[36] “Icons and Artwork.” [Online]. Available: https://developer.gnome.org/hig/stable/icons-and-artwork.html.en. [Accessed: 22-Jun-2015].
[37] “Icons- Google design guidelines.” [Online]. Available: https://www.google.com/design/spec/style/icons.html. [Accessed: 14-Jun-2015].
[38] “SetWindowsHookEx function (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms644990%28v=vs.85%29.aspx. [Accessed: 14-Jun-2015].
[39] “Keyboard Input Notifications (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ff468861(v=vs.85).aspx. [Accessed: 14-Jun-2015].
[40] “GetAsyncKeyState function (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms646293(v=vs.85).aspx. [Accessed: 14-Jun-2015].
[41] “Virtual-Key Codes (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/dd375731(v=vs.85).aspx. [Accessed: 14-Jun-2015].
[42] “Windows API Index (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ff818516. [Accessed: 26-Mar-2015].
[43] “Control Library.” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/bb773169(v=vs.85).aspx. [Accessed: 25-Jun-2015].
[44] “Desktop PCs operating system market share 2012-2015 .” [Online]. Available: http://www.statista.com/statistics/218089/global-market-share-of-windows-7/. [Accessed: 15-Jun-2015].
[45] “Xlib.” [Online]. Available: https://en.wikipedia.org/wiki/Xlib.
[46] “XGrabKeyboard.” [Online]. Available: http://tronche.com/gui/x/xlib/input/XGrabKeyboard.html. [Accessed: 14-Jun-2015].
[47] “XGrabPointer.” [Online]. Available: http://tronche.com/gui/x/xlib/input/XGrabPointer.html. [Accessed: 14-Jun-2015].
[48] “Xlib - C Language X Interface.” [Online]. Available: http://www.x.org/releases/X11R7.6/doc/libX11/specs/libX11/libX11.html#Obtaining_Window_Information. [Accessed: 14-Jun-2015].
[49] “linux - Getting pid and details for topmost window.” [Online]. Available: http://stackoverflow.com/questions/2041532/getting-pid-and-details-for-topmost-window/2042371#2042371. [Accessed: 15-Jun-2015].
[50] “QFile Class.” [Online]. Available: http://doc.qt.io/qt-5/qfile.html. [Accessed: 18-Jun-2015].
[51] “GFile: GIO Reference Manual.” [Online]. Available: https://developer.gnome.org/gio/stable/GFile.html. [Accessed: 18-Jun-2015].
指導教授 陳奕明(Yi-Ming Chen) 審核日期 2015-7-24
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明