Gender based analysis Udayan Kumar Computer and Information Science and Engineering (CISE) Department, University Of Florida, Gainesville, FL.

Slides:



Advertisements
Similar presentations
Motorola General Business Use MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are.
Advertisements

Introduction Are college students aware of the Monongalia County Health Department services? Are college students practicing preventative health care measures?
Eye Tracking Analysis of User Behavior in WWW Search Laura Granka Thorsten Joachims Geri Gay.
Women’s public lives Results of questionnaires April 2012.
Mobility and Predictability of Ultra Mobile Users Jeeyoung Kim and Ahmed Helmy.
0ictQATAR October 13, 2008 Qatar’s ICT Statistical Information Areas Tariq Gulrez.
Assuming normally distributed data! Naïve Bayes Classifier.
Making Acquaintances Investigating how quickly acquaintances are made John Stevens Introduction As Britons become increasing mobile, the ability to form.
UNDERSTANDING PERIODICITY AND REGULARITY OF NODAL ENCOUNTERS IN MOBILE NETWORKS: A SPECTRAL ANALYSIS Sungwook Moon, Ahmed Helmy Dept. of Computer and Information.
Consumers on the Web: Identification of usage patterns Consumers on the Web: Identification of usage patterns by Nina Koiso-Kanttila
Modeling client arrivals at access points in wireless campus-wide networks Maria Papadopouli Assistant Professor Department of Computer Science University.
THE CO-OP ADVANTAGE: NOTES FROM A NATIONAL PANEL SURVEY ALEX USHER HIGHER EDUCATION STRATEGY ASSOCIATES University of Waterloo Waterloo, Ontario – September.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
9. Demo Scenario #1 Behavioral profile upon discovering friends/enemies 1)No friends and enemies: search for friends.  Turn by 90 degree and go forward.
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
Data Mining : Introduction Chapter 1. 2 Index 1. What is Data Mining? 2. Data Mining Functionalities 1. Characterization and Discrimination 2. MIning.
Ahmed Helmy Computer and Information Science and Engineering (CISE) Department University of Florida Founder.
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
EXTRACT: MINING SOCIAL FEATURES FROM WLAN TRACES: A GENDER-BASED CASE STUDY By Udayan Kumar Ahmed Helmy University of Florida Presented by Ahmed Alghamdi.
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Extract: Mining Social Features from WLAN Traces A Gender-Based Case Study Udayan Kumar and Ahmed Helmy Computer and Information Sciences and Engineering,
Employment, unemployment and economic activity Coventry working age population by gender Source: Annual Population Survey, Office for National Statistics.
1.1 Chapter One What is Statistics?. 1.2 What is Statistics? “Statistics is a way to get information from data.”
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
WiCop: Engineering WiFi Temporal White-Space for Safe Operations of Wireless Body Area Networks in Medical Applications Yufei Wang, Qixin Wang, Zheng Zeng,
1 A Comparative Study of Handheld and Non-Handheld Traffic in Campus Wi-Fi Networks Aaron Gember, Ashok Anand, and Aditya Akella University of Wisconsin—Madison.
Hao Wu Nov Outline Introduction Related Work Experiment Methods Results Conclusions & Next Steps.
Findings Heather Perrault   Faculty Advisor: Justin Patchin  Criminal Justice Program  Department of Political.
Page 1www.sitecore.net Behavioral Targeting – Live!  The importance of understanding and attaching engagement value  to each visitor interaction Presented.
AP Psychology September What is “Statistics”?  A common language for describing, organizing, and interpreting data  Aspects:  Distribution 
© 2013 South-Western, a part of Cengage Learning. All rights reserved. Chapter 11 | Slide 1 Chapter 11: Building Customer Relationships Through Effective.
NextPlace: A Spatio-Temporal Prediction Framework for Pervasive Systems Salvatore Scellato1, Micro Musolesi, Cecilia Mascolo1, Vito Latora, and Andrew.
The Changing Usage of a Mature Campus-wide Wireless Network CS525m – Mobile and Ubiquitous Computing Andrew Stone.
Unconstrained Endpoint Profiling Googling the Internet Ionut Trestian, Supranamaya Ranjan, Alekandar Kuzmanovic, Antonio Nucci Reviewed by Lee Young Soo.
Department of Electrical Engineering and Computer Science Kunpeng Zhang, Yu Cheng, Yusheng Xie, Doug Downey, Ankit Agrawal, Alok Choudhary {kzh980,ych133,
Sungwook Moon, Ahmed Helmy 1 Mobile Testbeds with an Attitude Thanks to all the NOMAD group members for their great helps (U. Kumar, Y. Wang, G. Thakur,
Analyzing Tobacco Advertisements. What is the verbal message of the ad? What does it say exactly? Are there direct references to the product?
Investigation on the Library Robot “Alice” in an enterprise Lin Yuan.
ITrust: Encounter Based Trust recommendation System Udayan Kumar and Dr. Ahmed Helmy.
The Study of Japanese Chain Restaurant in Thailand.
NEW FOCUS nf nf 1 Research Strategy and Implementation Telephone: Facsimile: ACN: 066.
Advancing Science: OSTI’s Current and Future Search Strategies Jeff Given IT Operations Manager Computer Protection Program Manager Office of Scientific.
Quality system With no system of quality control how do you distinguish between the good, the bad and the ugly? quality assurance is all the planned and.
ONLINE SHOPPING SURVEY Ref No :B2015P156KN Date :
Chapter 9 Describing Variations in Data. A variable is…  A single characteristic that can vary and can be measured  Medical Variables:  Biological.
Distinguishing humans from robots in web search logs preliminary results using query rates and intervals Omer Duskin Dror G. Feitelson School of Computer.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Weighted Waypoint Mobility Model and Its Impact on Ad Hoc Networks Electrical Engineering Department UNIVERSITY OF SOUTHERN CALIFORNIA USC Kashyap Merchant,
Development of ICT Statistics - The Experience of Hong Kong, China Census and Statistics Department (C&SD)
WARM UP: Penny Sampling 1.) Take a look at the graphs that you made yesterday. What are some intuitive takeaways just from looking at the graphs?
Department of Applied English (International Business) Ming-Chuan University, April 10, 2010.
Analysis…Measures of Central Tendency How can we make SENSE of our research data???
Presentation of Results Mr. Joel LaLone Joel LaLone Consulting Watertown, New York April 11, 2014.
Context-aware Adaptive Routing for Delay Tolerant Networking
Reaching out to data users regarding next-generation news releases
Marketing Report January 2017.
Unit 3: Science of Psychology
socI 100: INTRODUCTION TO SOCIOLOGY
GOVT 201: Statistics for Political Science Prof. Brian Conley
Targeted Video Advertising
2017/10/01 The Asahi Shimbun Development and Co-ordination Office.
With fitbit you can transform your life by taking just one step forward Presented By: Sepideh Sanie.
Dieudo Mulamba November 2017
CIS 4930/6930, Spring 2018 Experiment 1: Encounter Tracing using Bluetooth Due Date: Feb 19, beginning of class Ph.D. student lead: Mimonah Al-Qathrady.
Golubev Alexandr, IMU Workshop, Chisinau 2018
Chapter 1: Exploring Data
Presentation transcript:

Gender based analysis Udayan Kumar Computer and Information Science and Engineering (CISE) Department, University Of Florida, Gainesville, FL

Inference of User Behavior 04/01/09 2 Problem Statement: 1. How can we classify users into groups based on gender, given publicly available traces ? 2. Can we analyze User behavior and preferences using the above classification ? Our study is based on WLAN trace analysis* We present a systematic technique to group WLAN users. As a case study we applied it to gender.

Information in WLAN traces 04/01/09 3 Trace we used : Number of Users ~4000 Trace Period = Feb 2006, Oct 2006, Feb 2007 Do not provide :- User information like name, gender, major. MAC (anonymized) ‏ AP associationsStart timeDuration

 How can we classify users in groups like major and gender? Methodology 04/01/09 4 visitors Males Females University Campus Fraternity Sorority traces  Fraternities house males  Sororites house females

Filtering 04/01/09 5 How can we distinguish visitors from residents? Definition: Session of visitors would be significantly less than that of regular users. This definition can be used in two ways based on Individual behavior Group behavior

04/01/09 6 In this graph the “Knee” bend is a important feature We classify those below the knee as visitors and exclude them from further studies. (order of magnitude difference in sessions) ‏ Knee Feb 2006No. of Males No. of Females Before filtering After filtering Similar trend is seen in other trace samples as well

Individual behavior

Name based UF traces have username (UFID) UF phonebook can be searched using usernames Finally SSN office provides a list of most popular male and female baby names Can classify more than 25% of the users

Verification of filtering (Sororities) ‏ 04/01/09 9 Before Filtering Month(a)Month(b) ‏ # of Users(a)# of users(b) ‏ Common% users Feb2006Mar-Apr Oct2006Nov Feb2007Mar-Apr After Filtering Month(a)Month(b) ‏ Female(a)Female(b) ‏ Common% Common Feb2006Mar-Apr Oct2006Nov Feb2007Mar-Apr

Time Evolution* 04/01/09 10 *Udayan Kumar, Nikhil Yadav and Ahmed Helmy, “Analyzing Gender-gaps in Mobile Student Societies”, CRAWDAD Workshop poster 3 days4 days5 days 6 days 7 days 14 days

Using this info 04/01/09 11 Problem Statement: How can we classify users into groups based on gender, given publicly available traces ? Can we analyze User behavior and preferences using the above classification ? We analyze the traces with the following metrics Major (Buildings most frequented) ‏ Online activity (Session duration) ‏ Device preference (Apple or PC) ‏

WLAN User Distribution* 12 Engineering and economics have more males, while social science has more females. *Udayan Kumar, Nikhil Yadav and Ahmed Helmy, “Gender-based Grouping of Mobile Student Societies”, The International Workshop on Mobile Device and Urban Sensing (MODUS), IPSN 2008 Workshop

Average session duration 13 Are there trends in the average online times of users ? Males have shorter sessions than females. *Udayan Kumar, Nikhil Yadav and Ahmed Helmy, “Gender-based Grouping of Mobile Student Societies”, The International Workshop on Mobile Device and Urban Sensing (MODUS), IPSN 2008 Workshop

14 Device preferences: Which device vendors do different genders prefer? Females seem to prefer Apple over Intel Preference Statistical significance test says with 90% confidence that there is bias within genders for brands/vendors *Udayan Kumar, Nikhil Yadav and Ahmed Helmy, “Gender-based Grouping of Mobile Student Societies”, The International Workshop on Mobile Device and Urban Sensing (MODUS), IPSN 2008 Workshop

What can we do with it ? (Applications) ‏ 04/01/09 15 Profiling : identify gender, preference, major for a user Social Science: extent of WLAN adoption amongst genders can point out socio-economic and socio-cultural gaps between genders. Directed Ads: If an advertiser of male product want to target its users, he can find from the traces regions of campus frequented by men. Application Customization: Based on preference of the genders Designing network protocols for DTN (Delay Tolerant Networks)‏

What now ? ( Future Work ) ‏ 04/01/09 16

Visualization: all females 04/01/09 17

All females + Law school 04/01/09 18

All females+Law school+Apple Comp. 04/01/09 19