Determining user needs through abnormality detection and heterogeneous embedding of usage sequence
- 16 Downloads
In this study, we propose an advanced method for determining user needs based on abnormality detection and heterogeneous embedding of the usage sequences. We focus on the implied needs at the fine-grained levels based on the usage sequence, whereas previous textual review-based approaches have focused on the explicit needs at the product levels. Moreover, although previous studies regarding a usage sequence have primarily focused on an analysis of the tendency, app prediction, or recommendations, we first attempted to uncover abnormal sequences regarding user needs. Furthermore, in terms of the methodology, we then attempted a heterogeneous embedding approach to calculate the vector representation of each element of the usage sequence including the application, buttons, content, or system keys by utilizing the metapath2vec algorithm, which differs from previous studies that have focused solely on the embedding application usage. Further, to apply the abnormality detection method in determining an abnormal sequence corresponding to the user needs, we calculate the vector representation of the entire usage sequence utilizing RNN-AE based on heterogeneous embedding. After examining and evaluating the extracted abnormal sequences with the help of domain experts from LG Electronics, the experimental results verify that our proposed method can effectively extract a meaningful abnormal sequence corresponding to the implied needs. In addition, we calculated the correlation of the coefficient between the abnormality score and the importance score of the extracted sequences to compare the performance of each sequence model and the abnormality detection method.
KeywordsDetermining needs Implied needs Heterogeneous embedding Usage sequences Abnormality detection Sequence modeling
We appreciate LG Electronics for providing us with the app usage dataset. Moreover, we are thankful to the domain experts involved in the examination and evaluation of the extracted usage sequences: Jungmin Park (UX designer), Minhyeok Kim (UX researcher), Christina Suh (Chief UX designer), and Shinhui Ahn (Senior UX designer), among others.
- 2.Algur, S. P., & Bhat, P. (2016). Abnormal web video detection using density based lof method. International Journal of Computer Sciences and Engineering, 4, 6–14.Google Scholar
- 3.Amiriparian, S., Freitag, M., Cummins, N., & Schuller, B. (2017). Sequence to sequence autoencoders for unsupervised representation learning from audio. In Proceedings of the DCASE 2017 workshop.Google Scholar
- 4.Anzai, Y. (2012). Pattern recognition and machine learning. Amsterdam: Elsevier.Google Scholar
- 5.Baeza-Yates, R., Jiang, D., Silvestri, F., & Harrison, B. (2015). Predicting the next app that you are going to use. In Proceedings of the eighth ACM international conference on web search and data mining (pp. 285–294). ACM.Google Scholar
- 7.Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). Lof: Identifying density-based local outliers. In ACM sigmod record (Vol. 29, pp. 93–104). ACM.Google Scholar
- 9.Dong, Y., Chawla, N. V., & Swami, A. (2017). metapath2vec: Scalable representation learning for heterogeneous networks. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 135–144). ACM.Google Scholar
- 10.Fang, Y., Si, L., Somasundaram, N., & Yu, Z. (2012). Mining contrastive opinions on political texts using cross-perspective topic model. In Proceedings of the fifth ACM international conference on Web search and data mining (pp. 63–72). ACM.Google Scholar
- 15.Jang, B. R., Noh, Y., Lee, S. J., & Park, S. B. (2015). A combination of temporal and general preferences for app recommendation. In 2015 International conference on big data and smart computing (BigComp) (pp. 178–185). IEEE.Google Scholar
- 16.Jang, M., Seo, S., & Kang, P. (2018). Recurrent neural network-based semantic variational autoencoder for sequence-to-sequence learning. arXiv preprint arXiv:1802.03238.
- 20.Kostakos, V., Ferreira, D., Goncalves, J., & Hosio, S. (2016). Modelling smartphone usage: A markov state transition model. In Proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing (pp. 486–497). ACM.Google Scholar
- 21.Lappas, T., Crovella, M., & Terzi, E. (2012). Selecting a characteristic set of reviews. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 832–840). ACM.Google Scholar
- 22.Lee, C. C., & Hu, C. (2005). Analyzing hotel customers’ e-complaints from an internet complaint forum. Journal of Travel & Tourism Marketing, 17(2–3), 167–181.Google Scholar
- 23.Lee, T., & Bradlow, E. T. (2007). Automatic construction of conjoint attributes and levels from online customer reviews. University of Pennsylvania, The Wharton School Working Paper.Google Scholar
- 25.Lin, J., Sugiyama, K., Kan, M. Y., & Chua, T. S. (2014). New and improved: Modeling versions to improve app recommendation. In Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval, pp. 647–656. ACM.Google Scholar
- 26.Liu, B., Kong, D., Cen, L., Gong, N.Z., Jin, H., & Xiong, H. (2015). Personalized mobile app recommendation: Reconciling app functionality and user privacy preference. In Proceedings of the eighth ACM international conference on web search and data mining (pp. 315–324). ACM.Google Scholar
- 27.Liu, D., Xiang, C., Li, S., Ren, J., Liu, R., Liang, L., et al. (2018). Hinextapp: A context-aware and adaptive framework for app prediction in mobile systems. In Sustainable computing: Informatics and systems.Google Scholar
- 29.Ly, D. K., Sugiyama, K., Lin, Z., & Kan, M. Y. (2011). Product review summarization from a deeper perspective. In Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries (pp. 311–314). ACM.Google Scholar
- 30.Ma, Z., Sun, A., Yuan, Q., & Cong, G.(2012). Topic-driven reader comments summarization. In Proceedings of the 21st ACM international conference on Information and knowledge management (pp. 265–274). ACM.Google Scholar
- 31.Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., & Shroff, G. (2016). Lstm-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148.
- 33.Mukherjee, A., & Liu, B. (2012). Mining contentions from discussions and debates. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 841–849). ACM.Google Scholar
- 34.Mukherji, A., Srinivasan, V., & Welbourne, E. (2014). Adding intelligence to your mobile device via on-device sequential pattern mining. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing (pp. 1005–1014). ACM.Google Scholar
- 41.Shi, Y., Wei, F., Yu, K., & Wu, X. (2018). App usage prediction based on an extended feature selection method rspec mic. In 2018 IEEE 3rd international conference on big data analysis (ICBDA) (pp. 324–328). IEEE.Google Scholar
- 42.Srinivasan, V., Moghaddam, S., Mukherji, A., Rachuri, K. K., Xu, C., & Tapia, E. M. (2014). Mobileminer: Mining your frequent patterns on your phone. In Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing (pp. 389–400). ACM.Google Scholar
- 44.Tsaparas, P., Ntoulas, A., & Terzi, E.(2011). Selecting a comprehensive set of reviews. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 168–176). ACM.Google Scholar
- 45.Ulwick, A. W. (2003). The strategic role of customer requirements in innovation. Strategyn inc 13, 12.Google Scholar
- 47.Verma, P., Singh, P., & Yadava, R. (2017). Fuzzy c-means clustering based outlier detection for saw electronic nose. In 2017 2nd international conference for convergence in technology (I2CT) (pp. 513–519). IEEE.Google Scholar
- 49.Xu, X., Lei, Y., & Zhou, X. (2018). A lof-based method for abnormal segment detection in machinery condition monitoring. In 2018 Prognostics and system health management conference (PHM-Chongqing) (pp. 125–128). IEEE.Google Scholar
- 51.Yu, I. H., Song, J. J., Ko, J. M., Kim, Y. I. (2010). A survey of customer responses for developing value-added services. In 2010 international conference on control automation and systems (ICCAS) (pp. 815–818). IEEE.Google Scholar