• Title/Summary/Keyword: User's Behavior

Search Result 870, Processing Time 0.028 seconds

A Configuration Methods of Sensor Reflecting User's Behaviors in the Ubiquitous House (유비쿼터스 주택에서의 사용자 행위에 따른 센서 기기 구성방법에 관한 연구 - 시나리오에 따른 사용자 행위 분석을 기반으로 -)

  • Lee, Dong-Hwa;Park, Sung-Jun;Lee, Hyun-Soo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.10a
    • /
    • pp.111-114
    • /
    • 2005
  • The purpose of this study is to suggest configuration methods of sensor according to user's behaviors in the ubiquitous house. Recently, with appearing the concept of 'Ubiquitous', the applications of ubiquitous technologies on the our environment adopt a new paradigm. This new paradigm leads to the possibility of creating more intellectual dwelling environment according to user's behaviors. This paper suggests to change our dwelling by considering both engineering technology and considering the character of dwelling, because the house should provide causes humans with comfortability. Therefore, we need to understand user's behaviors in the dwelling, towards user friendly environment.

  • PDF

Design & Evaluation of an Intelligent Model for Extracting the Web User' Preference (웹 사용자의 선호도 추출을 위한 지능모델 설계 및 평가)

  • Kim, Kwang-Nam;Yoon, Hee-Byung;Kim, Hwa-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.443-450
    • /
    • 2005
  • In this paper, we propose an intelligent model lot extraction of the web user's preference and present the results of evaluation. For this purpose, we analyze shortcomings of current information retrieval engine being used and reflect preference weights on learner. As it doesn't depend on frequency of each word but intelligently learns patterns of user behavior, the mechanism Provides the appropriate set of results about user's questions. Then, we propose the concept of preference trend and its considerations and present an algorithm for extracting preference with examples. Also, we design an intelligent model for extraction of behavior patterns and propose HTML index and process of intelligent learning for preference decision. Finally, we validate the proposed model by comparing estimated results(after applying the Preference) of document ranking measurement.

Understanding the Concept of User Experience Based on the Extended Concept of Usability

  • Lee, Dong-Hun;Chung, Min-K.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.2
    • /
    • pp.299-308
    • /
    • 2012
  • Objective: This study presents the conceptual framework and the conceptual model to account for user experience by expanding the existing concepts of usability, in particular considering the user-interface environment in digital convergence. Background: To better understand a variety of users interacting with a converged product based on digital technologies, there seems to be a limit to consider the existing concepts of usability. All possible aspects of user's interaction with a product in a context of use need to be taken into consideration. Method: This study identifies the concept of user experience through a comprehensive literature review. Results: First, this study reviews the existing concepts of usability and user experience. And then this study describes four main components in the conceptual framework of user experience: user's internal states, user's external states, a product, and various outcomes, each of which encompasses distinct sub-components. The conceptual model of user experience accounts for how user's internal states change over time and for how different sub-components affect actual behavior of use. Conclusion: It is expected that these user experience concepts can be used in basic resources to better understand different behavioral characteristics of users and to better design interactive products in converged digital environments.

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Designing a Healthcare Service Model for IoB Environments (IoB 환경을 위한 헬스케어 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Policy
    • /
    • v.1 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • Recently, the healthcare field is trying to develop a model that can improve service quality by reflecting the requirements of various industrial fields. In this paper, we propose an Internet of Behavior (IoB) environment model that can process users' healthcare information in real time in a 5G environment to improve healthcare services. The purpose of the proposed model is to analyze the user's healthcare information through deep learning and then check the health status in real time. In this case, the biometric information of the user is transmitted through communication equipment attached to the portable medical equipment, and user authentication is performed through information previously input to the attached IoB device. The difference from the existing IoT healthcare service is that it analyzes the user's habits and behavior patterns and converts them into digital data, and it can induce user-specific behaviors to improve the user's healthcare service based on the collected data.

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

An Adaptive Recommendation System for Personalized Stock Trading Advice Using Artificial Neural Networks

  • Kaensar, Chayaporn;Chalidabhongse, Thanarat
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.931-934
    • /
    • 2005
  • This paper describes an adaptive recommendation system that provides real-time personalized trading advice to the investors based on their profiles and trading information environment. A proposed system integrates Stochastic technical analysis and artificial neural network that incorporates an adaptive user modeling. The user model is constructed and updated based on initial user profile and recorded user interactions with the system. The information presented to each individual user is also tailor-made to fit the user's behavior and preference. A system prototype was implemented in JAVA. Experiments used to evaluate the system's performance were done on both human subjects and synthetic users. The results show our proposed system is able to rapidly learn to provide appropriate advice to different types of users.

  • PDF

A Study on the Spatial Configuration by Investigation and Analysis of user's behavior of Public Libraries in Korea (국내 공공도서관의 이용자 행위조사.분석에 따른 공간구성에 관한 연구)

  • Lee, Soo-Kyung;Kim, Yong-Seung
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.6
    • /
    • pp.188-196
    • /
    • 2008
  • The study aims to find out the changing aspects of contemporary Korean libraries so called public in terms of their spatial configuration. In so doing, it analysed 14 recently built libraries by investigation of user's behavior. Interview and observation were conducted as a method of investigation. The method of analysis was based on statistics by mapping spatial data. As the result, it could be said that most users have a clear goal in Korea. In some libraries, the distinct characteristics of behavior show that users visit other functional rooms including functional rooms for the purpose. It could be said that the configuration of space in recently public libraries become more public as a place. In view of domestic affairs, in terms of users need, the reading room for personal study have features of the most private room and a static activity. so that the reading room separate from the other functional rooms in floor, but it adjoin other functional rooms in the horizontal configuration. so its location make offset a role of functional rooms can be interactive with each other, except reading room.