Professional Documents
Culture Documents
Research Article
Tourist Behavior Pattern Mining Model Based on Context
Copyright © 2013 D.-s. Liu and S.-j. Fan. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly
cited.
Personalized travel experience and service of tourist has been a hot topic research in the tourism service supply chain. In this paper,
we take the context into consideration and propose an analyzed method to the tourist based on the context: firstly, we analyze the
context which influences the tourist behavior patterns, select the main context factors, and construct the tourist behavior pattern
model based on it; then, we calculate the interest degree of the tourist behavior pattern and mine out the rules with high interest
degree with the association rule algorithm; we can make some recommendations to the tourist with better personalized travelling
experience and services. At last, we make an experiment to show the feasibility and effectiveness of our method.
l5 l10 4.6
4.5
4.4
l6
Context
4.3
l3 1 4.2
3.2
Y
3
l9
l2 2
l8 1.8
X User Temperature
Time Network bandwidth
u1 with device 1 u2 with device 2 Service Others
u2 with device 1 u3 with device 2 Location Law
u3 with device 1 Location Device
u1 with device 2
Figure 3: The results of the questionnaire.
Figure 2: Movement trajectories of customers when they use
different devices.
𝐷 ⋈ 𝐿, 𝐿 ⋈ 𝑇, and 𝑇 ⋈ 𝑆; the computational formulas of every Low level of interest Common level of High level of
edge weight are as follows. interest interest
th1 th2
s1
l1 8+8 t15
u1
3 2
2
d1 11 + 11
l2 s2
4+2 t16 3+4
3 1+1
2
9
2 28
2 l3 6 s3 s
u u2 9
2 21 + 4 + 9 + 2 17 + 3 + 9 + 1
2
3 d2 6+6+6
t17
l4
13 + 5
6+6
2 5 15 + 5 s4
4
l5 12 + 12 + 18 + 18 t18 s5
u3 8
16
≈ 0.254
63 2 s1
3 2 × l1 t15 ≈ 0.057
= 0.5 ≈ 0.167 35
u1 6 d1 12 ×
4 11 + 11 3+4
≈ 0.333 l2 ≈ 0.349 = 0.2 s2
12 63 35
3 t16
= 0.5 2
6 ≈ 0.167 6
u2 12 ≈ 0.171
× l3 35 s3
4 21 + 4 17 + 3
≈ 0.333 ≈ 0.397 ≈ 0.571
12 63 35 ×
d2 t17
l4
s4
u3
l5 t18
s5
u1 s1
l1 t15
d1 2
= 0.25 s2
8 l2 28 t16
2 9
= 0.5 2 ≈ 0.583 × ≈ 0.265
4 = 0.25 48 34
8 2
= 0.25
u2 8 l3 9 s3
2 = 0.1875
= 0.5 48 9+1
4 2 9+2 ≈ 0.294
= 0.25 ≈ 0.229 t17 34
d2 8 48
l4
15 s4
≈ 0.441
34
u3
l5 t18 s5
u1 t15 s1
l1
d1
l2 s2
t16
u2 3 l3 s3
6+6+6
= 0.6 = 0.6
5 30 13 + 5
t17 ≈ 0.514
× × 35
5 s4
l4 5 ≈ 0.143 4
≈ 0.077 35 ≈ 0.114
65 × 35
2 6+6
u3 = 0.4 d2 = 0.4 l5 t18 s5
5 30 12 + 18 + 12 + 18 8
≈ 0.923 ≈ 0.229
65 35
algorithm, the GRI algorithm, the CARAMA algorithm and in Table 7, Table 6 has other 28 rules and these rules have
Predictive-Apriori algorithm on the original data (here we the feature of high interest, so they will provide more choices
set the minimum support equals to 20% and the minimum to the service provider and more services to the mobile
confidence equals to 80%; too), and we get following rules as customer. Then we observe the rule which has the maximum
is shown in Tables 7, 8, 9, and 10. value of lift from Tables 6 and 7, the rule is time = 𝑡17 and
Comparing Table 6 with Tables 7 and 8, there are 11 rules service = 𝑠3 → location = 𝑙3 ; it means that the method we
from Table 7 which have been emerged in Table 6 (the rules proposed is similar to the classical Apriori algorithm. At last,
marked with yellow as is shown in Table 6), and all rules are the rule whose ID = 1 in Table 7: location = 𝑙1 → user = 𝑢1 ,It is
in Table 8 have been emerged in Table 6. So we think that the the only rule that is not included in Table 6, although this rule
method we proposed to mine the mobile customer behavior meets the minimum support and the minimum confidence;
pattern has the merit of effectiveness; in this experiment the the pattern with {𝑙1 , 𝑢1 } is a low interesting pattern as we
validity of the method is about 91.67% (11/12) to the Apriori definite before, and the rule location = 𝑙1 → user = 𝑢1 is an
algorithm and 100% (6/6) to the GRI algorithm, which means uninteresting rule. In our method, we can reject uninteresting
the coverage values are 91.67% and 100%, which are larger rules like this. Through the analysis, the method we proposed
than the threshold we set before. It means that the method in this paper is more feasible and advanced when being
we proposed is feasibile and effective. Excluding the 11 rules compared with the Apriori algorithm.
10 Discrete Dynamics in Nature and Society
Table 7: The results based on Apriori algorithm. Table 10: The results based on Predictive-Apriori algorithm.
(4) To what extent do you think the device will influence References
the behavior?
[1] M. Qing, Research on Constructing Personalized Tourism Service
(A) Strongly disagree Supply Chain in the Context of Modern Information Technology,
Shandong University of Finance and Economics, 2012.
(B) Disagree
[2] A. Farmaki, “An exploration of tourist motivation in rural
(C) Neutral
settings: the case of Troodos, Cyprus,” Tourism Management
(D) Agree Perspectives, vol. 2-3, pp. 72–78, 2012.
(E) Strongly agree [3] C. A. Martin and S. F. Witt, “Tourism demand forecasting
models: choice of appropriate variable to represent tourists’ cost
(5) To what extent do you think the service will influence of living,” Tourism Management, vol. 8, no. 3, pp. 233–246, 1987.
the behavior? [4] C. Smallman and K. Moore, “Process studies of tourists’
decision-making,” Annals of Tourism Research, vol. 37, no. 2, pp.
(A) Strongly disagree 397–422, 2010.
(B) Disagree [5] S. S. Kim, D. J. Timothy, and J. Hwang, “Understanding Japanese
(C) Neutral tourists’ shopping preferences using the Decision Tree Analysis
(D) Agree method,” Tourism Management, vol. 32, no. 3, pp. 544–554, 2011.
(E) Strongly agree [6] B. Schilit, N. Adams, and R. Want, “Context-aware computing
applications,” in Proceedings of the Workshop on Mobile Com-
(6) To what extent do you think the network bandwith puting Systems and Applications, pp. 85–90, December 1994.
will influence the behavior? [7] P. J. Brown, J. D. Bovey, and X. Chen, “Context-aware applica-
tions: from the laboratory to the marketplace,” IEEE Personal
(A) Strongly disagree Communications, vol. 4, no. 5, pp. 58–64, 1997.
(B) Disagree [8] Y. A. Rakotonirain, S. W. Iokey, and G. Fitzpatrick, “Context-
(C) Neutral awareness for the mobile environment,” 2008-10-02.
(D) Agree [9] D. Snowdon and A. Grasso, “Providing context awareness via a
large screen display,” in Proceedings of the CHI 2000 Workshop
(E) Strongly agree on “The What, Who, Where, When, Why and How of Context-
Awareness”, 2000, report no. 2000/011.
(7) To what extent do you think the temperature will
[10] J. Z. Gu, “Context aware computing,” Journal of East China
influence the behavior?
Normal University: Natural Science, vol. 5, pp. 1–20, 2009.
(A) Strongly disagree [11] R. Agrawal, T. Imielinski, and A. Swami, “Mining association
rules between sets of items in large databases,” in Proceedings of
(B) Disagree
the 1993 ACM SIGMOD International Conference on Manage-
(C) Neutral ment of Data, pp. 207–216, May 1993.
(D) Agree [12] J. Han, M. Kamber, and J. Pei, Data Mining Concepts and
(E) Strongly agree Techniques, China Machine Press, Beijing, China, 3rd edition,
2012.
(8) To what extent do you think the law will influence the [13] K. J. Kang, B. Ka, and S. J. Kim, “A service scenario gen-
behavior? eration scheme based on association rule mining for elderly
surveillance system in a smart home environment,” Engineering
(A) Strongly disagree Applications of Artificial Intelligence, vol. 25, pp. 1355–1364, 2012.
(B) Disagree [14] Z. Y. Zhang, Y. P. Zhang, J. Y. Zhang, and X. J. Zhang,
(C) Neutral “Application of improved association rule algorithm in college
(D) Agree teaching management,” Computer Engineering, vol. 38, no. 2, pp.
75–78, 2012.
(E) Strongly agree
[15] V. S. Tseng and K. W. Lin, “Efficient mining and prediction of
(9) Others factors will influence the behavior, such as —. user behavior patterns in mobile web systems,” Information and
Software Technology, vol. 48, no. 6, pp. 357–369, 2006.
[16] Z. B. Ma, T. J. Lu, and H. Q. Li, “Mining of temporal sequence
Acknowledgments mobile access patterns based on context awareness,” Transaction
of Beijing Institute of Technology, vol. 28, no. 10, pp. 937–940,
This research is supported by the National Natural Science 2008.
Foundation of China (Grant nos. 71071140 and 71301070005), [17] T. S. Chen, Y. S. Chou, and T. C. Chen, “Mining user movement
the National Natural Science Foundation of Zhejiang behavior patterns in a mobile service environment,” IEEE
Province (Grant no. Y1090617), the Key Innovation Team Transactions on Systems, Man, and Cybernetics A, vol. 42, no.
of Zhejiang Province (Grant no. 2010R50041), the Soft 1, pp. 87–101, 2012.
science key research project of Zhejiang Province (Grant no. [18] Y. Q. Hu, Operational Research, Tsinghua University Press,
2013C25053), the Zhejiang Gongshang University Graduate Beijing, China, 3rd edition, 2007.
Student Scientific Research Project (1130XJ1512168), and the
Modern Business Centre of Zhejiang GongShang University.
Copyright of Discrete Dynamics in Nature & Society is the property of Hindawi Publishing
Corporation and its content may not be copied or emailed to multiple sites or posted to a
listserv without the copyright holder's express written permission. However, users may print,
download, or email articles for individual use.