跳到主要內容

簡易檢索 / 詳目顯示

研究生: 林俊勇
Lim Chun Yeong
論文名稱: 視窗環境下使用者行為獲取機制研究
User Behavior Acquire Mechanism Under Windows Program Environment
指導教授: 陳奕明
Yi-Ming Chen
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系
Department of Information Management
論文出版年: 2015
畢業學年度: 103
語文別: 中文
論文頁數: 77
中文關鍵詞: API Hooking使用者行為視窗縮放快捷鍵視窗網格
外文關鍵詞: Window Rescale, Hotkeys, Keyboard Shortcut, Window Grid
相關次數: 點閱:8下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 蒐集使用者行為資訊以提供個人化的服務與提升服務品質已日漸重要,因此如何準確地獲取使用者於服務使用時的行為便成為重要的議題。目前在學術研究上已經有許多關於使用者行為獲取的機制與相關研究,其中最常見的作法為以圖像辨識方式獲取使用者行為,但其消耗CPU效能,且同時在圖像劇烈變化之下無法正確地辨識以及獲取使用者行為。目前多數相關研究的缺點是僅針對固定視窗大小進行辨識,且在多數常用的功能皆已提供快捷鍵情況下,目前研究並無提供辨識快捷鍵的功能。為改善這些缺點,本研究提出視窗環境下之使用者行為獲取機制研究,將應用程式的視窗以一個網格48x48的方式切割,並設定好每一個網格上代表的元件,以獲取使用者在應用程式上的行為。同時本研究亦提供自動重算視窗網格的改變,能即時獲取使用者行為。我們已在Windows作業系統上完成系統雛型,同時也進行了兩個實驗。實驗結果顯示本研究能正確地針對Windows以及GTK所開發的視窗程式進行辨識並獲取使用者行為。


    With a collection of user behavior information to provide a personalized service and to improve the service quality has become increasingly important. How to accurately obtain user behavior when user using the service or application has become an important issue. Currently, in the academic study has a number of mechanisms related research on user behavior acquired. One of the most famous practice was image recognition for acquisition user behavior, but its consumption performance, and at the same time it can’t properly identify and obtain user behavior under the picture dramatically. In the majority of studies conducted to identify only for a fixed window size. On the other hand, the most commonly used functions have provide a hotkeys to greatly enhance user interaction with the GUI interface, but these studies didn’t provide identification and obtain what function is the hotkeys was press. To improve these shortcomings, our study presents a user behavior acquire mechanisms under windows program environment, to recognize the whole windows program to get the user behavior on the program’s window. At the same time, our study also provide an automatic recalculation adjusted of this specified location for the changes of the windows program location, so that it’s possible to automatically identify and capture the user behavior when user change the windows program size and click on the specified location or specified button. We have completed a prototype system on Windows Operating System, also carried out two experiments. The results show that can correctly against Windows and GTK programs identify and obtain user behavior.

    論文摘要 i Abstract ii 誌謝 iii 目錄 iv 圖目錄 vi 表目錄 viii 第一章 緒論 1 1-1 研究背景 1 1-2 研究動機與目的 4 1-3 研究貢獻 5 1-4 章節架構 5 第二章 相關研究 6 2-1 使用者行為的定義 6 2-2 使用者行為獲取方式 7 2-2-1 網頁或應用程式的使用者行為獲取方式 7 2-2-2 以追踪系統記錄檔為獲取方式 11 2-3 畫面辨識與視窗資訊獲取方式 12 2-4 快捷鍵 18 2-5 小結 19 第三章 視窗環境下使用者行為獲取機制 21 3-1 機制設計、架構與運作流程 21 3-1-1 機制設計之考量 21 3-1-2 視窗環境下使用者行為獲取機制之架構流程 23 3-2 模組功能詳述 25 3-2-1 鍵盤模組 25 3-2-2 滑鼠模組 27 3-2-3 操作資訊記錄模組 35 3-3 視窗環境下使用者行為獲取機制流程及擴充方式 36 3-4 系統移植探討 39 3-4-1 Linux移植的可能性 39 第四章 實驗與討論 44 4-1 實驗一:UBAM在視窗程式縮放及快捷鍵的功能性及準確度驗證 44 4-1-1 實驗目的 44 4-1-2 實驗環境與設計 44 4-1-3 實驗結果 45 4-2 實驗二:UBAM對系統效能的影響 48 4-2-1 實驗目的 48 4-2-2 實驗環境與設計 48 4-2-3 實驗結果 50 4-3 小結 53 第五章 結論與未來研究 54 5-1 研究結論與貢獻 54 5-2 研究限制 54 5-3 未來研究 55 參考文獻 57 附錄一 62

    [1] “數位化/多螢匯流浪潮衝擊 閱聽眾收視調查機制大翻新 - 懂市場 - 新電子科技雜誌.” [Online]. Available: http://www.mem.com.tw/article_content.asp?sn=1303080006. [Accessed: 25-Mar-2015].
    [2] J. Huang, R. W. White, and S. Dumais, “No clicks, no problem: Using cursor movements to understand and improve search,” Proc. 29th SIGCHI Conf. Hum. Factors Comput. Syst., p. 1225, 2011.
    [3] Y. Zhang, W. Chen, D. Wang, and Q. Yang, “User-click modeling for understanding and predicting search-behavior,” Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discov. data Min. - KDD ’11, p. 1388, 2011.
    [4] C. Xu, C. Du, G. F. Zhao, and S. Yu, “A novel model for user clicks identification based on hidden semi-Markov,” J. Netw. Comput. Appl., vol. 36, pp. 791–798, 2013.
    [5] J. Teng, T. Y. Pan, Z. M. Zhu, and K. Lu, “A personalized recommendation model based on the user-state awareness,” Proc. - 2009 1st IEEE Symp. Web Soc. SWS 2009, pp. 10–13, 2009.
    [6] “打好基本功 - YouTube.” [Online]. Available: http://www.youtube.com/yt/artists/zh-TW/master-the-basics.html. [Accessed: 30-Jun-2015].
    [7] “Facebook Test Lets Users Pick Which Pages’ & Friends' Posts Appear At Top Of News Feed.” [Online]. Available: http://marketingland.com/facebook-test-lets-users-pick-which-pages-friends-posts-appear-at-top-of-news-feed-127790. [Accessed: 30-Jun-2015].
    [8] “Facebook Tests Feature Letting Users Pick Pages, Friends They’d Want To See Atop News Feed | SocialTimes.” [Online]. Available: http://www.adweek.com/socialtimes/facebook-tests-feature-letting-users-pick-pages-friends-theyd-want-to-see-atop-news-feed/619554. [Accessed: 30-Jun-2015].
    [9] “EdgeRank成過去-探討Facebook動態消息演算法.” [Online]. Available: http://www.inboundjournals.com/edgerank-is-dead-facebooks-news-feed-algorithm-factors/. [Accessed: 30-Jun-2015].
    [10] 資策會,“以電子商務推薦系統打造個人化數位學習服務。” [Online]. Available: http://newsletter.teldap.tw/news/HaveYourSayContent.php?nid=4653&lid=533.
    [11] D. Van Den Poel and W. Buckinx, “Predicting online-purchasing behaviour,” Eur. J. Oper. Res., vol. 166, pp. 557–575, 2005.
    [12] R. Atterer, M. Wnuk, and A. Schmidt, “Knowing the user’s every move: user activity tracking for website usability evaluation and implicit interaction,” Proc. 15th Int. Conf. World Wide Web, pp. 203–212, 2006.
    [13] Y. M. Chen, C. E. Chuang, H. C. Liu, C. Y. Ni, and C. T. Wang, “Using agent in virtual machine for interactive security training,” Commun. Comput. Inf. Sci., vol. 259 CCIS, pp. 65–74, 2011.
    [14] “中央大學雲端安全實驗平台.” [Online]. Available: http://csep.mgt.ncu.edu.tw/.
    [15] 卿韻亭,「基於Windows API之實驗狀態回饋機制研究─以CSEP雲端安全實驗平台為例」,國立中央大學資訊管理學系碩士論文,2014。
    [16] A. Keane and S. O’Shaughnessy, “Tracking user activity on personal computers,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng., vol. 88 LNICST, pp. 188–196, 2012.
    [17] M. Claypool, P. Le, M. Wased, and D. Brown, “Implicit interest indicators,” Proc. 6th Int. Conf. Intell. user interfaces - IUI ’01, pp. 33–40, 2001.
    [18] T. Yeh, T.-H. Chang, and R. C. Miller, “Sikuli: using GUI screenshots for search and automation,” Proc. 22nd Annu. ACM Symp. User interface Softw. Technol., no. Figure 1, pp. 183–192, 2009.
    [19] A. Hurst, S. E. Hudson, and J. Mankoff, “Automatically identifying targets users interact with during real world tasks,” Proc. 15th Int. Conf. Intell. user interfaces, pp. 11–20, 2010.
    [20] T. Grossman, P. Dragicevic, and R. Balakrishnan, “Strategies for accelerating on-line learning of hotkeys,” Proc. SIGCHI Conf. Hum. factors Comput. Syst. - CHI ’07, pp. 1591–1600, 2007.
    [21] “Oxford Learner’s Dictionaries.” [Online]. Available: http://www.oxfordlearnersdictionaries.com/. [Accessed: 02-Jul-2015].
    [22] S. Pachidi, M. Spruit, and I. Van De Weerd, “Understanding users’ behavior with software operation data mining,” Comput. Human Behav., vol. 30, pp. 583–594, 2014.
    [23] J. A. Castañeda, F. Muñoz-Leiva, and T. Luque, “Web Acceptance Model (WAM): Moderating effects of user experience,” Inf. Manag., vol. 44, no. 4, pp. 384–396, 2007.
    [24] F. Muñoz-Leiva, “Generalising user behaviour in online travel sites through the Travel 2.0 website acceptance model,” Online Inf. Rev., vol. 36, no. 6, pp. 879–902, 2012.
    [25] R. N. Schwartz and J. L. Plass, “Click versus drag: User-performed tasks and the enactment effect in an interactive multimedia environment,” Comput. Human Behav., vol. 33, pp. 242–255, 2014.
    [26] T. Marsh, S. P. Smith, K. Yang, and C. Shahabi, “Continuous and Unobtrusive Capture of User-Player Behaviour and Experience to Assess and Inform Game Design and Development,” Proc. 2006 ACM SIGGRAPH Symp. Videogames, pp. 1–8, 2006.
    [27] L. a. Leiva and J. Huang, “Building a better mousetrap: Compressing mouse cursor activity for web analytics,” Inf. Process. Manag., vol. 51, no. 2, pp. 114–129, 2015.
    [28] “Website Heatmap & Session Replay Tool - Mouseflow.” [Online]. Available: https://mouseflow.com/. [Accessed: 05-Jul-2015].
    [29] “Click Tale.” [Online]. Available: http://www.clicktale.com/. [Accessed: 05-Jul-2015].
    [30] Microsoft, “Introdcuting Spy++.” [Online]. Available: http://msdn.microsoft.com/en-us/library/dd460756.aspx.
    [31] “AHKinfo 窗口信息工具.” [Online]. Available: http://ahk8.com/thread-4010.html. [Accessed: 26-Mar-2015].
    [32] S. . Malacria, G. . Bailly, J. . Harrison, A. . Cockburn, and C. . Gutwin, “Promoting hotkey use through rehearsal with ExposeHK,” Conf. Hum. Factors Comput. Syst. - Proc., pp. 573–582, 2013.
    [33] S. K. Card, T. P. Moran, and A. Newel, “The Keystroke-Level Model for User Performance Time with Interactive Ssystems,” Communications of the ACM Volume 23 Issue 7, pp. 396–410, Jul-1980.
    [34] D. L. Odell, R. C. Davis, a Smith, and P. K. Wright, “Toolglasses, marking menus, and hotkeys: a comparison of one and two-handed command selection techniques,” Proc. Graph. Interface - GI ’04, pp. 17–24, 2004.
    [35] “Icons (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/dn742485(v=vs.85).aspx. [Accessed: 14-Jun-2015].
    [36] “Icons and Artwork.” [Online]. Available: https://developer.gnome.org/hig/stable/icons-and-artwork.html.en. [Accessed: 22-Jun-2015].
    [37] “Icons- Google design guidelines.” [Online]. Available: https://www.google.com/design/spec/style/icons.html. [Accessed: 14-Jun-2015].
    [38] “SetWindowsHookEx function (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms644990%28v=vs.85%29.aspx. [Accessed: 14-Jun-2015].
    [39] “Keyboard Input Notifications (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ff468861(v=vs.85).aspx. [Accessed: 14-Jun-2015].
    [40] “GetAsyncKeyState function (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms646293(v=vs.85).aspx. [Accessed: 14-Jun-2015].
    [41] “Virtual-Key Codes (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/dd375731(v=vs.85).aspx. [Accessed: 14-Jun-2015].
    [42] “Windows API Index (Windows).” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ff818516. [Accessed: 26-Mar-2015].
    [43] “Control Library.” [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/bb773169(v=vs.85).aspx. [Accessed: 25-Jun-2015].
    [44] “Desktop PCs operating system market share 2012-2015 .” [Online]. Available: http://www.statista.com/statistics/218089/global-market-share-of-windows-7/. [Accessed: 15-Jun-2015].
    [45] “Xlib.” [Online]. Available: https://en.wikipedia.org/wiki/Xlib.
    [46] “XGrabKeyboard.” [Online]. Available: http://tronche.com/gui/x/xlib/input/XGrabKeyboard.html. [Accessed: 14-Jun-2015].
    [47] “XGrabPointer.” [Online]. Available: http://tronche.com/gui/x/xlib/input/XGrabPointer.html. [Accessed: 14-Jun-2015].
    [48] “Xlib - C Language X Interface.” [Online]. Available: http://www.x.org/releases/X11R7.6/doc/libX11/specs/libX11/libX11.html#Obtaining_Window_Information. [Accessed: 14-Jun-2015].
    [49] “linux - Getting pid and details for topmost window.” [Online]. Available: http://stackoverflow.com/questions/2041532/getting-pid-and-details-for-topmost-window/2042371#2042371. [Accessed: 15-Jun-2015].
    [50] “QFile Class.” [Online]. Available: http://doc.qt.io/qt-5/qfile.html. [Accessed: 18-Jun-2015].
    [51] “GFile: GIO Reference Manual.” [Online]. Available: https://developer.gnome.org/gio/stable/GFile.html. [Accessed: 18-Jun-2015].

    QR CODE
    :::