簡易檢索 / 詳目顯示

研究生: 蔡亞唐
Ya-Tang Tsai
論文名稱: 運用無線網路滲漏資訊分析店面消費者行為
Shop Consumer Behavior Analysis Based on Wi-Fi Leaks
指導教授: 鮑興國
Hsing-Kuo Pao
口試委員: 李育杰
Yuh-Jye Lee
項天瑞
Tien-Ruey Hsiang
孫敏德
Min-Te Sun
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 48
中文關鍵詞: 消費者行為時空分析
外文關鍵詞: Consumer Behavior, Spatial and Temporal Analysis
相關次數: 點閱:306下載:17
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於無線網路是透過廣播的方式傳遞資料,人們很容易的透露出自己的個人資料,包含關於隱私的資料。然而, 我們也可以透過這些無線網路的資料,來讓我們更加了解每個人的生活風格與個性. 我們利用時間與空間性的分析來分析顧客,而這些資訊當中並不會包含各人隱私有關的資料。

    隨著物聯網的發展,生活中隨處可見各式各樣的感應裝置在追蹤人們的生活狀況,而無線網路的蓬勃發展加速了此進程,如何觀察顧客與店家的互動方法更加多元。由於智慧型裝置的普遍,顧客的行為更多的透過手上的裝置來完成,不單純的只是打電話,更可透過無線網路來進行社交、看影片之行為。

    此篇論文以分析顧客無線網路資訊,我們在咖啡廳實地收集店所發出的無線網路訊號裡。在咖啡廳當中架設一台AP,並利用AP裝置監聽廣播在空間中的訊號,收集連線要求與資料要求之訊號,並將之即時回傳至儲存裝置當中。而這些訊號並不包含任何個人隱私有關的資訊,我們透過對這些資料的時間與空間的來分析,利用分析結果來做分群,以便於適應不同顧客群體的習慣。利用建置多個微型模型來達到的預測同時得到與顧客個人有關之資訊。我們利用支援向量回歸透過對於過去資料的訓練,來預測未來顧客來店人數。同時我們也使用支援向量分類器來預測顧客來店與否,顧客來店之後其內用外帶之判斷。


    Becasue of the transmitting of wireless network using broadcasting, people easily leak their personal information, including the privacy information. However, due to the information from public wireless, it's easy for us to understand people's life style and personality. We use the spatial and temporal information to analysis the customers without fetching any personal privacy.

    As the development of IoT, lots of kind and number of sensing deveces monitoring human life, wireless network increase the speed of the procedure. people rely on their smart devices to communicate, watch video, play games, and so on. That's why we can provide shop owners different kind of information by observing and analysis different kind of customers. With these information, the shop can give customized service.

    This thesis analysis the Wi-Fi information of customers, we collected Wi-Fi signal in the real world environment coffee shop. We seted a AP in the coffee shop, use it to listen the signal that devices broadcasted in the environment, that included connection request and data request signals, then we save those data into the storge in real time. Those information doesn't include personal privacy related information.

    We use this data to do spatial and temporal analysis, and use the results clustering the custoemrs to suit different kind of habbit group of customers. We build the models for each cluster called micro models to predict the information related to the customers. We use SVR trained by historical data to predict the number of coming customers in the future. And we also use SVM to predict the customers will come to the coffee shop or not. If the customer comes in, we predict he/she will be stay-in or take-out.

    Recommendation Letter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Approval Letter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Abstract in Chinese . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Abstract in English . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Research Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Thesis Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Data Collecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1 Background Knowledge of Wireless Network . . . . . . . . . . . . . . . 5 2.1.1 Connecting Protocol . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.2 SSID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Environment Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3 Data Preprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.1 Reasearch Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 Spatial Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 Temporal Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.4 Spatial and Temporal Analysis . . . . . . . . . . . . . . . . . . . . . . . 11 3.5 Unweighted Pair Group Method with Arithmetic Mean . . . . . . . . . . 11 3.6 Marco Model and Micro Models . . . . . . . . . . . . . . . . . . . . . . 12 3.7 Support Vector Machine and Support Vector Regression . . . . . . . . . . 13 4 Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4.1 Data Collecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4.2 Labeled Data by Expert . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.3 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4.4 Survey of Collecting Data . . . . . . . . . . . . . . . . . . . . . . . . . 17 5 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.1 Data Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.2 Data Preprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.3 Experimental Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 5.3.1 Predict the Number of Customers . . . . . . . . . . . . . . . . . 25 5.3.2 Predict the Customer Will Come or Not . . . . . . . . . . . . . . 25 5.3.3 Predict the Customer Will Stay In or Take Out . . . . . . . . . . 26 5.4 Evaluation Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 5.5 Experiment, Result, Analysis . . . . . . . . . . . . . . . . . . . . . . . . 28 5.5.1 Predict the Number of Customers . . . . . . . . . . . . . . . . . 28 5.5.2 Predict the Customer will Come or Not . . . . . . . . . . . . . . 29 5.5.3 Predict the customer Will Be Stay-In or Take-Out . . . . . . . . . 30 5.6 Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

    [1] Z. Fu, M. Almgren, O. Landsiedel, and M. Papatriantafilou, “Online temporal-spatial analysis for detection
    of critical events in cyber-physical systems,” in Big Data (Big Data), 2014 IEEE International
    Conference on, pp. 129–134, IEEE, 2014.
    [2] F. Chen, J. Dai, B. Wang, S. Sahu, M. Naphade, and C.-T. Lu, “Activity analysis based on low sample
    rate smart meters,” in Proceedings of the 17th ACM SIGKDD international conference on Knowledge
    discovery and data mining, pp. 240–248, ACM, 2011.
    [3] S. Emtiyaz and M. Keyvanpour, “Customers behavior modeling by semi-supervised learning in customer
    relationship management,” arXiv preprint arXiv:1201.1670, 2012.
    [4] S. Goel, J. M. Hofman, S. Lahaie, D. M. Pennock, and D. J. Watts, “Predicting consumer behavior with
    web search,” Proceedings of the National academy of sciences, vol. 107, no. 41, pp. 17486–17490,
    2010.
    [5] S. Jiang, J. Ferreira Jr, and M. C. Gonzalez, “Discovering urban spatial-temporal structure from human
    activity patterns,” in Proceedings of the ACM SIGKDD international workshop on urban computing,
    pp. 95–102, ACM, 2012.
    [6] Z. Suhong, Y. Lijun, and D. Lifang, “The spatial-temporal pattern of people’s daily activities and transportation
    demand analysis-a case study of guangzhou, china,” in Management and Service Science
    (MASS), 2010 International Conference on, pp. 1–4, IEEE, 2010.
    [7] C.-C. Chang and C.-J. Lin, “LIBSVM: A library for support vector machines,” ACM Transactions
    on Intelligent Systems and Technology, vol. 2, pp. 27:1–27:27, 2011. Software available at http:
    //www.csie.ntu.edu.tw/~cjlin/libsvm.

    QR CODE