• Title/Summary/Keyword: User Action

Search Result 430, Processing Time 0.022 seconds

User Action Prediction System based on Life-log Analysis (라이프로그 분석을 통한 사용자 행동예측 시스템)

  • Sera Jang;Eunseok Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.662-664
    • /
    • 2008
  • 위치기반 검색, 광고, SNS, 지도 등 사용자의 위치에 기반한 다양한 서비스들이 모바일 디바이스 사용자에게 제공되어 지고 있다. 그러나 이러한 서비스들은 대부분 현재시점의 사용자의 위치 정보를 기반으로 하고 있어, 제공 가능한 서비스 영역이 제한되어 있다. "Where" 뿐만이 아니라, "When-Where-What" 을 안다면 이러한 제한을 극복하고 사용자에게 보다 편리하고 유용성 있는 정보와 서비스 제공이 가능할 것이다. 본 연구에서는 모바일 디바이스에서 생성 가능한 사용자의 라이프 로그를 효율적으로 수집하고, 수집된 로그를 분석하여 사용자의 행동 예측 데이터를 제공하는 시스템을 제안하였다. 제안 시스템은 라이프로그에 기반한 사용자의 행동 예측을 가능하게 하여, 이를 통한 다양한 응용서비스 제공을 지원한다.

The Social Implication of New Media Art in Forming a Community (공동체 형성에 있어서 뉴미디어아트의 사회적 역할에 대한 고찰)

  • Kim, Hee-Young
    • The Journal of Art Theory & Practice
    • /
    • no.14
    • /
    • pp.87-124
    • /
    • 2012
  • This paper focuses on the social implication of new media art, which has evolved with the advance of technology. To understand the notion of human-computer interactivity in media art, it examines the meaning of "cybernetics" theory invented by Norbert Wiener just after WWII, who provided "control and communication" as central components of his theory of messages. It goes on to investigate the application of cybernetics theory onto art since the 1960s, to which Roy Ascott made a significant contribution by developing telematic art, utilizing the network of telecommunication. This paper underlines the significance of the relationship between human and machine, art and technology in transforming the work of art as a site of communication and experience. The interactivity in new media art transforms the viewer into the user of the work, who is now provided free will to make decisions on his or her action with the work. The artist is no longer a godlike figure who determines the meaning of the work, yet becomes another user of his or her own work, with which to interact. This paper believes that the interaction between man and machine, art and technology can lead to various ways of interaction between humans, thereby restoring a sense of community while liberating humans from conventional limitations on their creativity. This paper considers the development of new media art more than a mere invention of new aesthetic styles employing advanced technology. Rather, new media art provides a critical shift in subverting the modernist autonomy that advocates the medium specificity. New media art envisions a new art, which would embrace impurity into art, allowing the coexistence of autonomy and heteronomy, embracing a technological other, thereby expanding human relations. By enabling the birth of the user in experiencing the work, interactive new media art produces an open arena, in which the user can create the work while communicating with the work and other users. The user now has freedom to visit the work, to take a journey on his or her own, and to make decisions on what to choose and what to do with the work. This paper contends that there is a significant parallel between new media artists' interest in creating new experiences of the art and Jacques Ranci$\grave{e}$re's concept of the aesthetic regime of art. In his argument for eliminating hierarchy in art and for embracing impurity, Ranci$\grave{e}$re provides a vision for art, which is related to life and ultimately reshapes life. Ranci$\grave{e}$re's critique of both formalist modernism and Jean-Francois Lyotard's postmodern view underlines the social implication of new media art practices, which seek to form "the common of a community."

  • PDF

Development of Facial Expression Recognition System based on Bayesian Network using FACS and AAM (FACS와 AAM을 이용한 Bayesian Network 기반 얼굴 표정 인식 시스템 개발)

  • Ko, Kwang-Eun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.562-567
    • /
    • 2009
  • As a key mechanism of the human emotion interaction, Facial Expression is a powerful tools in HRI(Human Robot Interface) such as Human Computer Interface. By using a facial expression, we can bring out various reaction correspond to emotional state of user in HCI(Human Computer Interaction). Also it can infer that suitable services to supply user from service agents such as intelligent robot. In this article, We addresses the issue of expressive face modeling using an advanced active appearance model for facial emotion recognition. We consider the six universal emotional categories that are defined by Ekman. In human face, emotions are most widely represented with eyes and mouth expression. If we want to recognize the human's emotion from this facial image, we need to extract feature points such as Action Unit(AU) of Ekman. Active Appearance Model (AAM) is one of the commonly used methods for facial feature extraction and it can be applied to construct AU. Regarding the traditional AAM depends on the setting of the initial parameters of the model and this paper introduces a facial emotion recognizing method based on which is combined Advanced AAM with Bayesian Network. Firstly, we obtain the reconstructive parameters of the new gray-scale image by sample-based learning and use them to reconstruct the shape and texture of the new image and calculate the initial parameters of the AAM by the reconstructed facial model. Then reduce the distance error between the model and the target contour by adjusting the parameters of the model. Finally get the model which is matched with the facial feature outline after several iterations and use them to recognize the facial emotion by using Bayesian Network.

Emotion-based Video Scene Retrieval using Interactive Genetic Algorithm (대화형 유전자 알고리즘을 이용한 감성기반 비디오 장면 검색)

  • Yoo Hun-Woo;Cho Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.514-528
    • /
    • 2004
  • An emotion-based video scene retrieval algorithm is proposed in this paper. First, abrupt/gradual shot boundaries are detected in the video clip representing a specific story Then, five video features such as 'average color histogram' 'average brightness', 'average edge histogram', 'average shot duration', and 'gradual change rate' are extracted from each of the videos and mapping between these features and the emotional space that user has in mind is achieved by an interactive genetic algorithm. Once the proposed algorithm has selected videos that contain the corresponding emotion from initial population of videos, feature vectors from the selected videos are regarded as chromosomes and a genetic crossover is applied over them. Next, new chromosomes after crossover and feature vectors in the database videos are compared based on the similarity function to obtain the most similar videos as solutions of the next generation. By iterating above procedures, new population of videos that user has in mind are retrieved. In order to show the validity of the proposed method, six example categories such as 'action', 'excitement', 'suspense', 'quietness', 'relaxation', 'happiness' are used as emotions for experiments. Over 300 commercial videos, retrieval results show 70% effectiveness in average.

The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor (DRM 로그분석을 통한 퇴직 징후 탐지와 보안위협 사전 대응 방법)

  • Hyun, Miboon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.369-375
    • /
    • 2016
  • Most companies are willing to spend money on security systems such as DRM, Mail filtering, DLP, USB blocking, etc., for data leakage prevention. However, in many cases, it is difficult that legal team take action for data case because usually the company recognized that after the employee had left. Therefore perceiving one's resignation before the action and building up adequate response process are very important. Throughout analyzing DRM log which records every single file's changes related with user's behavior, the company can predict one's resignation and prevent data leakage before those happen. This study suggests how to prevent for the damage from leaked confidential information throughout building the DRM monitoring process which can predict employee's resignation.

A Study on Development of Literacy Program Model for Adult Users of Public Libraries (공공도서관의 성인 리터러시 프로그램 모델 개발 연구)

  • Song, Kyeong-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.4
    • /
    • pp.175-204
    • /
    • 2016
  • This study drew four essential literacies for adult's daily life through analyzing the concepts of the 'skill' in PIAAC, and also investigated current literacy programs for adult users in Korean public libraries. Finally on those results, this study suggested a literacy program model with an illustrated action plan for adult users of pubic libraries. A suggested model is planed an intergrated program that make users can acquire four essential literacies through participating in a single program. This model is characterized by self-directed learning by the users and can be applied freely to various subjects and user groups. The model consists of six components and seven steps. Six components are target, theme, strategy, tool, material, assessment. Seven steps are targeting, selecting theme, strategy planning, documentation, action, assessing. This model is named $6{\times}7$ model on the basis of components and steps.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

Design and Implementation of a Stealth Game featuring Avoidance (회피를 이용한 잠입 액션 게임의 기획 및 구현)

  • Choi, Yoonji;Han, Sang-Goo;Moon, Gyu-Song;Paik, Doowon;Oh, Kyoungsu
    • Journal of Korea Game Society
    • /
    • v.16 no.4
    • /
    • pp.25-34
    • /
    • 2016
  • Recent stealth games are mainly action games with frontal confrontation or combat features. In this paper, we designed and implemented an stealth game, where characters are weak person and play is conducted by avoiding the situation, not by frontal confrontation. We chose the light as the key factor for the avoidance. The players can survive and fulfill the missions by blocking the enemy's vision. After implementing the first version, we found that the game using only the avoidance is not as fun as expected. To make the game more interesting, we added limited attack function, provided mini map for better user interface, and this paper describes the options we had and experiences of the decision making process to make the better game.

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information (상태정보에 따른 체내삽입형 장치를 부착한 유-헬스케어 환자의 프라이버시 보호 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.297-306
    • /
    • 2012
  • IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.

Internet of Things-Based Command Center to Improve Emergency Response in Underground Mines

  • Jha, Ankit;Verburg, Alex;Tukkaraja, Purushotham
    • Safety and Health at Work
    • /
    • v.13 no.1
    • /
    • pp.40-50
    • /
    • 2022
  • Background: Underground mines have several hazards that could lead to serious consequences if they come into effect. Acquiring, evaluating, and using the real-time data from the atmospheric monitoring system and miner's positional information is crucial in deciding the best course of action. Methods: A graphical user interface-based software is developed that uses an AutoCAD-based mine map, real-time atmospheric monitoring system, and miners' positional information to guide on the shortest route to mine exit and other locations within the mine, including the refuge chamber. Several algorithms are implemented to enhance the visualization of the program and guide the miners through the shortest routes. The information relayed by the sensors and communicated by other personnel are collected, evaluated, and used by the program in proposing the best course of action. Results: The program was evaluated using two case studies involving rescue relating to elevated carbon monoxide levels and increased temperature simulating fire scenarios. The program proposed the shortest path from the miner's current location to the exit of the mine, nearest refuge chamber, and the phone location. The real-time sensor information relayed by all the sensors was collected in a comma-separated value file. Conclusion: This program presents an important tool that aggregates information relayed by sensors to propose the best rescue strategy. The visualization capability of the program allows the operator to observe all the information on a screen and monitor the rescue in real time. This program permits the incorporation of additional sensors and algorithms to further customize the tool.