• Title/Summary/Keyword: User Activity Information

Search Result 399, Processing Time 0.026 seconds

A Statistical Pattern Recognition Method for Providing User Demand in Community Computing (커뮤니티 컴퓨팅에서 사용자 요구 반영을 위한 통계적 패턴 인식 기법)

  • Kim, Sung-Bin;Jung, Hye-Dong;Lee, Hyung-Su;Kim, Seok-Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.287-289
    • /
    • 2009
  • The conventional computing is a centralizing system, but it has been gradually going to develop ubiquitous computing which moves roles away from the main. The Community Computing, a new paradigm, is proposed to implement environment of ubiquitous computing. In this environment, it is important to accept the user demand. Hence in this paper recognizes pattern of user's activity statistically and proposes a method of pattern estimation in community computing. In addition, user's activity varies with time and the activity has the priority We reflect these. Also, we improve accuracy of the method through Knowledge Base organization and the feedback system. We make program using Microsoft Visual C++ for evaluating performance of proposed method, then simulate it. We can confirm it from the experiment result that using proposal method is better in environment of community computing.

  • PDF

An Analysis of Energy Consumption Types Considering Life Patterns of Single-person Households (1인 가구 거주자의 생활패턴이 고려된 에너지소요량 유형 분석)

  • Lee, Seunghui;Jung, Sungwon;Lim, Ki-Taek
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.1
    • /
    • pp.37-46
    • /
    • 2019
  • The energy of the building is influenced by the user 's activity due to the population, society, and economic characteristics of the building user. In order to obtain accurate energy information, the difference in the amount of energy consumption by the activities and characteristics of building users should be identified. The purpose of the study is to identify the difference in the amount of energy consumption by the user's activities in the same building, and to analyse the relationship between user's activities and demographic, social and economic characteristics. For research, energy simulation is performed based on actual user activity schedule. The results of the simulation were clustered by using K-Means clustering, a machine learning technique. As a result, four types of users were derived based on the amount of energy consumption. The more energy used in a cluster, the lower the user's income level and older. The longer a user's indoor activity times, the higher the energy use, and these activities relate to the user's characteristics. There is more than twice the difference between the group that uses the least energy consumption and the group that uses the most energy consumption.

Detecting User Activities with the Accelerometer on Android Smartphones

  • Wang, Xingfeng;Kim, Heecheol
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.233-240
    • /
    • 2015
  • Mobile devices are becoming increasingly sophisticated and the latest generation of smartphones now incorporates many diverse and powerful sensors. These sensors include acceleration sensor, magnetic field sensor, light sensor, proximity sensor, gyroscope sensor, pressure sensor, rotation vector sensor, gravity sensor and orientation sensor. The availability of these sensors in mass-marketed communication devices creates exciting new opportunities for data mining and data mining applications. In this paper, we describe and evaluate a system that uses phone-based accelerometers to perform activity recognition, a task which involves identifying the physical activity that a user is performing. To implement our system, we collected labeled accelerometer data from 10 users as they performed daily activities such as "phone detached", "idle", "walking", "running", and "jumping", and then aggregated this time series data into examples that summarize the user activity 5-minute intervals. We then used the resulting training data to induce a predictive model for activity recognition. This work is significant because the activity recognition model permits us to gain useful knowledge about the habits of millions of users-just by having them carry cell phones in their pockets.

A Study of Information About Culture And Art Based On Application (최신 문화 예술공연 정보 제공 어플리케이션 연구)

  • Koo, Min-Jeong;Shin, Yea-Ri
    • The Journal of the Convergence on Culture Technology
    • /
    • v.1 no.4
    • /
    • pp.65-69
    • /
    • 2015
  • This study can read register reviews and search read information that users want by musical, drama and movie by using DB by developing App providing the newest culture view and information in android smart phone, when users want to enjoy cultural life. Also, the administrator logins as Administrator-mode and controls cultural information and makes smooth controlling by identifying user's information. In addition, the user logins as User-mode and reads cultural information and can make possible in reading and writing reviews. It makes possible to enjoy leisure activity as cultural activity by identifying reliable performance information via recommendation of friend groups.

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

Backlight Control on The PDA by A User's Activity and Posture (사용자의 활동과 자세에 의한 PDA의 백라이트 제어 기법)

  • Baek, Jong-Hun;Yun, Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.36-42
    • /
    • 2009
  • In the mobile device environment, the context-aware computing has been emerging as a core technology of ubiquitous computing. Compared with a desktop computer, a user interface and resource of mobile device is very limited. Traditional desktop-based user interface has been developed on the basis that a user's activity is static state. In contrast, mobile devices are not able to utilize representative desktop-based interaction mechanisms such as a keyboard and mouse, not only because the activity of a user is dynamic state, but mobile devices have limited resources and small LCD display. In this paper, we introduce an intelligent control system for the mobile device that can utility effectively the limited resource and complement the poor user interface by using an accelerometer being able to sense the physical activity and posture. The proposed system can estimate the user activity, static and dynamic states, and posture watching the PDA at the same time, and the proposed intelligent control system as its application, the backlight ON/OFF on the PDA, is run by the result of the user's behavior.

Automated networked knowledge map using keyword-based document networks (키워드 기반 문서 네트워크를 이용한 네트워크형 지식지도 자동 구성)

  • Yoo, Keedong
    • Knowledge Management Research
    • /
    • v.19 no.3
    • /
    • pp.47-61
    • /
    • 2018
  • A knowledge map, a taxonomy of knowledge repositories, must have capabilities supporting and enhancing knowledge user's activity to search and select proper knowledge for problem-solving. Conventional knowledge maps, however, have been hierarchically categorized, and could not support such activity that must coincide with the user's cognitive process for knowledge utilization. This paper, therefore, aims to verify and develop a methodology to build a networked knowledge map that can support user's activity to search and retrieve proper knowledge based on the referential navigation between content-relevant knowledge. This paper deploys keywords as the semantic information between knowledge, because they can represent the overall contents of a given document, and because they can play the role of semantic information on the link between related documents. By aggregating links between documents, a document network can be formulated: a keyword-based networked knowledge map can be finally built. Domain expert-based validation test was also conducted on a networked knowledge map of 50 research papers, which confirmed the performance of the proposed methodology to be outstanding with respect to the precision and recall.

강제된 정보시스템 사용환경에서 결과기대가 사용활동에 미치는 영향에 관한 연구;사회인지이론의 관점

  • O, Song-U;Gwak, Gi-Yeong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.123-128
    • /
    • 2007
  • It has been argued that Enterprise systems (ES) implementations are overshadowed by a high failure rate despite their promised benefits. One of the commonly cited reasons for ES implementation failures in the context of mandatory use is end-user's unwillingness or sabotage to adopt or use systems. Considering that the appropriate management of expectations may play an important role in making positive behavior toward newly implemented systems, this study examines the effect of outcome expectations on the system use activity in the mandatory use context of information systems from the Social Cognitive Theory perspective. Structural equation model analysis using LISREL 8.7 provides significant support for the proposed relationships. The empirical results suggest that outcome expectations and user satisfaction have positive effects on system use activity conceptualized by immersion, reinvention, and learning. Theoretical and practical implications of the study shed some light on how to improve system use activity in the mandatory use context of information systems.

  • PDF

Personal Informatics as an Information Ecology: Activity Trackers and Relational Affordances

  • Jarrahi, Mohammad Hossein
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.1
    • /
    • pp.7-16
    • /
    • 2022
  • With the proliferation of activity-tracking devices and other smart tools, more users leverage these personal informatics technologies to track their physical and fitness-related activities. The research on the benefits (and limitations) of these devices tends to focus on the use of a single tool, leaving out the interactions among multiple technologies, and how these interactions influence the way users perceive their affordances. Building from an ecological perspective, I extend this research by providing insight into the competitive and complementary relationships among activity tracking devices and other fitness-related and personal informatics technologies within the device ecology of technologies around the user. The affordances of these devices are therefore not enacted in isolation but are relational to understanding of other technological options and differing personal preferences and goals of the user.

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.