• Title/Summary/Keyword: User′s Pattern

Search Result 495, Processing Time 0.023 seconds

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

A Statistical Pattern Recognition Method for Providing User Demand in Community Computing (커뮤니티 컴퓨팅에서 사용자 요구 반영을 위한 통계적 패턴 인식 기법)

  • Kim, Sung-Bin;Jung, Hye-Dong;Lee, Hyung-Su;Kim, Seok-Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.287-289
    • /
    • 2009
  • The conventional computing is a centralizing system, but it has been gradually going to develop ubiquitous computing which moves roles away from the main. The Community Computing, a new paradigm, is proposed to implement environment of ubiquitous computing. In this environment, it is important to accept the user demand. Hence in this paper recognizes pattern of user's activity statistically and proposes a method of pattern estimation in community computing. In addition, user's activity varies with time and the activity has the priority We reflect these. Also, we improve accuracy of the method through Knowledge Base organization and the feedback system. We make program using Microsoft Visual C++ for evaluating performance of proposed method, then simulate it. We can confirm it from the experiment result that using proposal method is better in environment of community computing.

  • PDF

User Preference Prediction & Personalized Recommendation based on Item Dependency Map (IDM을 기반으로 한 사용자 프로파일 예측 및 개인화 추천 기법)

  • 염선희
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.211-214
    • /
    • 2003
  • In this paper, we intend to find user's TV program choosing pattern and, recommend programs that he/she wants. So we suggest item dependency map which express relation between chosen program. Using an algorithm that we suggest, we can recommend an program, which a user has not saw yet but maybe is likely to interested in. Item dependency map is used as patterns for association in hopfield network so we can extract users global program choosing pattern only using users partial information. Hopfield network can extract global information from sub-information. Our algorithm can predict user's inclination and recommend an user necessary information.

  • PDF

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.

Studios on the Physical and Psychological Analysis in Street Spaces for Improving the Streetscape of Olympic Daero (올림픽대로의 경관향상을 위한 가로공간 구성요소의 물리량과 심리량 분석에 관한 연구)

  • 김광래;진희성
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.2
    • /
    • pp.23-41
    • /
    • 1988
  • Environmental design pattern of the nine Small Urban Spaces at C.B.D. in City of Seoul are surveyed and analyzed for user's satisfaction and behavior under the environmental design evaluation by using Chrisopher Alexander's Pattern Language. Small Urban Spaces as a part of streetscape are formed by physical factors as well as visual environment and interacting user's behavior. Therefore, user's satisfacuion and behavior at the nine Urban Small Spaces were investigated under the further search for some possibilities of a pplication of those Pattern Languages. A pattern language has a structure of a network. It is used in sequence, going through the patterns, moving always from large patterns to smaller, always from the ones which create comes simply from the obsernation that most of the wonderful places of the city were not made by architects but by the people. It defines the limited number of arrangements of spaces that make sense in any given culture. And it actually gives us the power to generate these coherent arrangement of space. As a results, 'Plazl', 'Seats' and 'Accessibility' related design patterns are highly evaluated by Pattern Frequency, Pattern Interaction and their Composition ranks, thus reconfirm Whyte's Praise of urban Small Spaces in our inner city design environments. According to the multiple regression analysis of user's evaluation, the environmental functins related to the satisfaction were 'Plaza', 'Accessibility' and 'Paving'. According to the free response, user's prefer such visually pleasing environmental design object as 'Waterscape' and 'Setting'. In addition to, the basic needs in Urban Small Spaces are amenity facilities as bench, drinking water and shade for rest.

  • PDF

A Study on the User′s Pattern and Characteristics of Jeol-young Seaside Park (절영해안산책공원 이용객의 이용패턴과 특성에 관한 연구)

  • Lee, Myung-Kwan
    • Journal of Navigation and Port Research
    • /
    • v.28 no.5
    • /
    • pp.455-462
    • /
    • 2004
  • Recently, according to the increase of personal income and enough time to spare. people demand the expansion of waterfront space in the city and the development of waterfront's possibility. In this study, which takes a place of the Jeol-young seaside park in young-do investigated for the user's pattern of seaside park located in coastal area And analyzed into user's attributes and a feeling of satisfaction The results of this study were as follows : 1) The Jeol-young seaside park is facilitated for taking a walk. It also tends to be preferred for the ocean view, jogging, relaxation, and so on 2) The Jeol-young seaside park has to be ensured with its safety and convenience of esplanade. In order to provide the user's high satisfaction, more facilities of expansion and parking area are demanded to be developed.

Analysis on the Sleep Patterns and Design of System for Customized Deep Sleep Service in Motion Bed Environments (모션 베드 환경에서 맞춤형 숙면 서비스를 위한 시스템 설계 및 수면 패턴 분석)

  • Kang, Hyeon Jun;Lee, Seok Cheol;Jeong, Jun Seo;Cho, Sung Beom;Lee, Won Jin;Lee, Jae Dong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.1109-1121
    • /
    • 2022
  • As the demand for quality sleep increases in modern society, the importance of sleep technology has increased. Recently, development of sleep environment improvement products and research on the user's sleep improvement have been activated. Representatively, user sleep pattern analysis research is being conducted through the existing polysomnography, but it is difficult to use it in the sleep environment of daily life. Therefore, in this paper, we propose a system design that can provide a customized deep sleep service to users by detecting sleep disturbance factors in a motion bed environment. In order to improve the user's sleep satisfaction, a logistic regression-based sleep pattern analysis model is proposed and accuracy and significance are verified through experiments. And to improve user's sleep satisfaction, we propose a logistic regression-based sleep pattern analysis model and verify accuracy and significance through experiments. The proposed system is expected to improve the user's sleep quality and effectively prevent and manage sleep disorders.

The Development of the User-Customizable Favorites-based Smart Phone UX/UI Using Tap Pattern Similarity (탭 패턴 유사도를 이용한 사용자 맞춤형 즐겨찾기 스마트 폰 UX/UI개발)

  • Kim, Yeongbin;Kwak, Moon-Sang;Kim, Euhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.8
    • /
    • pp.95-106
    • /
    • 2014
  • In this paper, we design a smart phone UX/UI and a tap pattern recognition algorithm that can recognize tap patterns from a tapping user's fingers on the screen, and implement an application that provides user-customizable smart phones's services from the tap patterns. A user can generate a pattern by tapping the input pad several times and register it by using a smart phone's favorite program. More specifically, when the user inputs a tap pattern on the input pad, the proposed application searches a stored similar tap pattern and can run a service registered on it by measuring tap pattern similarity. Our experimental results show that the proposed method helps to guarantee the higher recognition rate and shorter input time for a variety of tap patterns.

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.