• Title/Summary/Keyword: User Awareness

Search Result 628, Processing Time 0.028 seconds

A Study of Digital filter for context-awareness using multi-sensor built in the smart-clothes (멀티센서 기반 스마트의류에서 상황인지를 위한 디지털필터연구)

  • Jeon, Byeong-chan;Park, Hyun-moon;Park, Won-Ki;Lee, Sung-chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.911-913
    • /
    • 2013
  • The user's context awareness is important to the reliability of sensors data. The sensor data is constantly change to external temp, internal& external environment and vibration. This noise environment is affecting that the data collected information from sensors. Of course this method of digital filter and inference algorithm specifically request for the use of ripple noise and action inference. In this paper, experiment was a comparison of the KF(Kalman Filter) and WMAF(Weight Moving Average Filter) for noise decrease and distortion prevention according to user behavior. And, we compared the EWDF(Extended Weight Dual Filter) with several filer. In an experiment, in contrast to other filter, the proposed filter is robust in a noise-environment.

  • PDF

A Study on the Context-Aware Reasoning Filtering Mechanism in USN

  • Sung, Kyung;Kim, Seok-Hun;Hong, Min
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.452-456
    • /
    • 2011
  • Context-awareness system can provide an optimized services to users. Analyzing physical and complex circumstance elements which give direct or indirect influence to users can tell what users want. However, there are various situation informations around users and it requires high level technology to extract the service what users really want among those informations. The circumstance of the user can be changed from moment to moment, even the service what users want also can be changed in every minutes. Recently the researches to provide the service which a user demands has been progressed actively. Web based filtering method which reaches commercialization is a one of good examples. This method extracts necessary data according to users' demands from the documents on the Web or multimedia informations. However, there is a limit to use it to provide Context-awareness service because it extracts static data, not dynamic data. There is also other researches with a rule based filtering method in progress to filter situation information but this method doesn't have mechanism for dynamic data as well. We would like to solve these problems by providing a dynamic situation information filtering mechanism applying an weighted value about each property of objects and also applying Web based dynamic categories in this paper when unnecessary data should be filtered.

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

Research on the evaluation model for the impact of AI services

  • Soonduck Yoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.191-202
    • /
    • 2023
  • This study aims to propose a framework for evaluating the impact of artificial intelligence (AI) services, based on the concept of AI service impact. It also suggests a model for evaluating this impact and identifies relevant factors and measurement approaches for each item of the model. The study classifies the impact of AI services into five categories: ethics, safety and reliability, compliance, user rights, and environmental friendliness. It discusses these five categories from a broad perspective and provides 21 detailed factors for evaluating each category. In terms of ethics, the study introduces three additional factors-accessibility, openness, and fairness-to the ten items initially developed by KISDI. In the safety and reliability category, the study excludes factors such as dependability, policy, compliance, and awareness improvement as they can be better addressed from a technical perspective. The compliance category includes factors such as human rights protection, privacy protection, non-infringement, publicness, accountability, safety, transparency, policy compliance, and explainability.For the user rights category, the study excludes factors such as publicness, data management, policy compliance, awareness improvement, recoverability, openness, and accuracy. The environmental friendliness category encompasses diversity, publicness, dependability, transparency, awareness improvement, recoverability, and openness.This study lays the foundation for further related research and contributes to the establishment of relevant policies by establishing a model for evaluating the impact of AI services. Future research is required to assess the validity of the developed indicators and provide specific evaluation items for practical use, based on expert evaluations.

A SENSOR DATA PROCESSING SYSTEM FOR LARGE SCALE CONTEXT AWARENESS

  • Choi Byung Kab;Jung Young Jin;Lee Yang Koo;Park Mi;Ryu Keun Ho;Kim Kyung Ok
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.333-336
    • /
    • 2005
  • The advance of wireless telecommunication and observation technologies leads developing sensor and sensor network for serving the context information continuously. Besides, in order to understand and cope with the context awareness based on the sensor network, it is becoming important issue to deal with plentiful data transmitted from various sensors. Therefore, we propose a context awareness system to deal with the plentiful sensor data in a vast area such as the prevention of a forest fire, the warning system for detecting environmental pollution, and the analysis of the traffic information, etc. The proposed system consists of the context acquisition to collect and store various sensor data, the knowledge base to keep context information and context log, the rule manager to process context information depending on user defined rules, and the situation information manager to analysis and recognize the context, etc. The proposed system is implemented for managing renewable energy data management transmitted from a large scale area.

  • PDF

Implementation of Position Awareness System Using One-Pass Tag (원패스 태그를 이용한 위치인식 시스템 구현)

  • Sohn, Jong-Hoon;Hwang, Gi-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.301-303
    • /
    • 2012
  • In this Paper, we are implemented position awareness system based on one-pass tag. This system are combined ZigBee and RFID technology. We developed the solution to detect of user's position using position awareness receiver and repeater. This location recognition includes parked car location tracking, coming in and out car, automation of immigration control, enhanced security through emergency call, and automatic invocation elevator control and etc.

  • PDF

A Critical Study on Attitudes and Awareness of Institutional Repositories and Open Access Publishing

  • Dhanavandan, S.;Tamizhchelvan, M.
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.4
    • /
    • pp.67-75
    • /
    • 2013
  • This paper discusses awareness of institutional repositories and open access publishing among faculty members in Annamalai University, Tamil Nadu, India. The authors distributed 200 questionnaires among the faculty members in Annamalai University. Out of 200 questionnaires, 160 responses (80.00%) were received from faculty members. The respondents mentioned the motivating factors while using an institutional repository and indicated the benefits, constraints and strategies to develop open access in publications. It is evident from the table that more than 95% among the average of the faculty members confirm the benefits of open access in publications. 150 (93.75%) of faculty members have awareness, 6 (3.75%) have no idea and 4 (2.50%) state no opinion about awareness of institutional repository and open access publishing.

Human Adaptive Device Development based on TD method for Smart Home

  • Park, Chang-Hyun;Sim, Kwee-Bo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1072-1075
    • /
    • 2005
  • This paper presents that TD method is applied to the human adaptive devices for smart home with context awareness (or recognition) technique. For smart home, the very important problem is how the appliances (or devices) can adapt to user. Since there are many humans to manage home appliances (or devices), managing the appliances automatically is difficult. Moreover, making the users be satisfied by the automatically managed devices is much more difficult. In order to do so, we can use several methods, fuzzy controller, neural network, reinforcement learning, etc. Though the some methods could be used, in this case (in dynamic environment), reinforcement learning is appropriate. Among some reinforcement learning methods, we select the Temporal Difference learning method as a core algorithm for adapting the devices to user. Since this paper assumes the environment is a smart home, we simply explained about the context awareness. Also, we treated with the TD method briefly and implement an example by VC++. Thereafter, we dealt with how the devices can be applied to this problem.

  • PDF

Analysis of PMIS Users Satisfaction and Loyalty Using Structural Equation Model

  • Kim, Min-Cheol;Lee, Hyung-Il;Cho, Sang-Ho;Kim, Ju-Hyung
    • Architectural research
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • Project management information systems (PMIS) have been implemented to support cooperation among the participants of construction projects. Unlike other information systems used by members from an organization with similar culture and business environment, the PMIS are members from one-off fragmented project organization with diverse professional background. Successful operation is significantly affected by the tendencies of client's side and individual awareness of participants. In this regard, it is imperative to evaluate the success of the system based on the individual characteristics of PMIS users. Thus, this study proposes a method for determining the system success by analyzing the extent of the effects of system factors such as System Quality, Information Quality, and Service Quality and individual factors such as a user's IT application ability, Extrinsic Motivation to achieve User Satisfaction, and loyalty. Accordingly, a structural equation model (SEM), an effective tool to examine of the comprehensive structure of a causal relationship, is applied for analysis because the internal awareness of individuals is established as a variable.

Temporal constraints GEO-RBAC for Context Awareness Service (공간 인식 서비스를 위한 Temporal constraints GEO-RBAC)

  • Shin Dong-Wook;Hwang Yu-Dong;Park Dong-Gue
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.382-389
    • /
    • 2006
  • Developing context awareness service In these day, It demands high security in context awareness service. So GEO-RBAC that provide user assignment of spatial role, assignment of permission, role schema, role instance and spatial role hierarchy to context awareness service is access control model to perfect in context awareness service. But GEO-RBAC is not considering temporal constraints that have to need context awareness environment. Consequently this paper improves the flexibleness of GEO-RBAC to consider time and period constraints notion and the time of GTRBAC that presents effective access control model. also we propose GEO-RBAC to consider temporal constraints for effective access control despite a various case.

  • PDF