• Title/Summary/Keyword: user activity

Search Result 707, Processing Time 0.025 seconds

Intelligent User Pattern Recognition based on Vision, Audio and Activity for Abnormal Event Detections of Single Households

  • Jung, Ju-Ho;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.59-66
    • /
    • 2019
  • According to the KT telecommunication statistics, people stayed inside their houses on an average of 11.9 hours a day. As well as, according to NSC statistics in the united states, people regardless of age are injured for a variety of reasons in their houses. For purposes of this research, we have investigated an abnormal event detection algorithm to classify infrequently occurring behaviors as accidents, health emergencies, etc. in their daily lives. We propose a fusion method that combines three classification algorithms with vision pattern, audio pattern, and activity pattern to detect unusual user events. The vision pattern algorithm identifies people and objects based on video data collected through home CCTV. The audio and activity pattern algorithms classify user audio and activity behaviors using the data collected from built-in sensors on their smartphones in their houses. We evaluated the proposed individual pattern algorithm and fusion method based on multiple scenarios.

A Study of the Measurement of Personal Activity on Online Marketing: Focus on SNS (온라인 마케팅 활동성 측정에 대한 연구- SNS 사용자 활동을 중심으로)

  • Kim, Sooeun;Kim, Eungdo
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.81-102
    • /
    • 2015
  • With the rapid development of digital media, there has been a huge change in a way of communication, a process of information diffusion and a role of traditional media. Not like mass media, social media enables users to generate and tap into the opinions of a larger world. From that reason, social media is impacting marketing strategies. However, still social media marketing researches just focus on case study, analysis of users motivation or analysis of power user's usage pattern. Word-of-mouth has always been important especially in marketing area. In social media, word-of-mouth depends on each user that's why this research focuses on individual user's activity in SNS. I defined 4 factors (produce, diffusion, network size, activity of network size enlarge) that are effect on activity and verified hypothesis by multiple regression analysis, hierarchical regression analysis and moderated multiple regression.

Contents Recommendation Scheme Considering User Activity in Social Network Environments (소셜 네트워크 환경에서 사용자 행위를 고려한 콘텐츠 추천 기법)

  • Ko, Geonsik;Kim, Byounghoon;Kim, Daeyun;Choi, Minwoong;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.404-414
    • /
    • 2017
  • With the development of smartphones and online social networks, users produce a lot of contents and share them with each other. Therefore, users spend time by viewing or receiving the contents they do not want. In order to solve such problems, schemes for recommending useful contents have been actively studied. In this paper, we propose a contents recommendation scheme using collaborative filtering for users on online social networks. The proposed scheme consider a user trust in order to remove user data that lower the accuracy of recommendation. The user trust is derived by analyzing the user activity of online social network. For evaluating the user trust from various points of view, we collect user activities that have not been used in conventional techniques. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.

Top-down Approach for User Abnormal Activity Detection Based on the Accelerometer (가속도 센서 기반 사용자 비정상 행동 검출 탑-다운 접근 방법 제안)

  • Lee, Min-Seok;Lim, Jong-Gwan;Kwon, Dong-Soo
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.368-372
    • /
    • 2009
  • The method to get the feature have been proposed to recognize the user activity by setting specific action for making the user independent result in previous research. However, it was only applied in specific environment and it was difficult to implement because it regarded only some specific feature as the recognized object. To improve this problem we detected the normality/abnormality of the activity based on the repetition and the continuity of the past activity pattern. We applied the unsupervised learning method, not supervised, and clustered the data which was collected within a certain period of time and we regarded it as the basis of the evaluation of the repetition. We demonstrated to be able to detect the abnormal activity based on wether the data was generated repeatedly.

  • PDF

Detecting User Activities with the Accelerometer on Android Smartphones

  • Wang, Xingfeng;Kim, Heecheol
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.233-240
    • /
    • 2015
  • Mobile devices are becoming increasingly sophisticated and the latest generation of smartphones now incorporates many diverse and powerful sensors. These sensors include acceleration sensor, magnetic field sensor, light sensor, proximity sensor, gyroscope sensor, pressure sensor, rotation vector sensor, gravity sensor and orientation sensor. The availability of these sensors in mass-marketed communication devices creates exciting new opportunities for data mining and data mining applications. In this paper, we describe and evaluate a system that uses phone-based accelerometers to perform activity recognition, a task which involves identifying the physical activity that a user is performing. To implement our system, we collected labeled accelerometer data from 10 users as they performed daily activities such as "phone detached", "idle", "walking", "running", and "jumping", and then aggregated this time series data into examples that summarize the user activity 5-minute intervals. We then used the resulting training data to induce a predictive model for activity recognition. This work is significant because the activity recognition model permits us to gain useful knowledge about the habits of millions of users-just by having them carry cell phones in their pockets.

An Effect of SNS Performance and Arts Information Service Quality on Initial Trust and Prosumer Activity: Focusing on Dance Performance (SNS 공연예술 정보서비스품질이 초기신뢰와 프로슈머 활동에 미치는 영향: 무용공연을 중심으로)

  • Park, Sun-Woo;Cho, Chul-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.1
    • /
    • pp.199-214
    • /
    • 2016
  • Purpose: The present study was designed to examine the casual relationships among performance and arts information service quality, initial trust, user satisfaction, reuse intention and prosumer activity in social network service(SNS). Also, we intended to explore significant factors on use performance of SNS through causal model analysis in the viewpoint of total effect. Methods: As a survey tool, questionnaire has obtained validity and reliability through literature survey, exploratory survey and pretest and sample 403 was selected. For statistical treatment of pretest and main analysis, SPSS18.0 and AMOS18.0 were employed and structural equation model was employed as analysis method. Results: Result of this study shows as follows. Two factors (precision and reciprocal action) have an effect on user satisfaction, initial trust, reuse intention and prosumer activity. We found that with an importance of initial trust, prosumer activity can be a useful and significant factor in causal relationship of SNS. Conclusion: The present study shows that two factors(precision and reciprocal action) in via of initial trust, were important factors that related companies have to emphasize to raise performance, And also we confirmed new factor 'prosumer activity' through this study. However, the present study has some limitations to be studied in the future.

An Active Mining Framework Design using Spatial-Temporal Ontology (시공간 온톨로지를 이용한 능동 마이닝 프레임워크 설계)

  • Hwang, Jeong-Hee;Noh, Si-Choon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3524-3531
    • /
    • 2010
  • In order to supply suitable services to users in ubiquitous computing environments, it is important to consider both location and time information which is related to all object and user's activity. To do this, in this paper, we design a spatial-temporal ontology considering user context and propose a system architecture for active mining user activity and service pattern. The proposed system is a framework for active mining user activity and service pattern by considering the relation between user context and object based on trigger system.

Design and Implementation of IoT Collaboration Module Supporting User Context Management (사용자 상황 정보 관리를 지원하는 IoT 통합 제어 모듈 설계 및 구현)

  • Kum, Seung Woo;Lim, Tae Beom;Park, Jong Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.3
    • /
    • pp.129-137
    • /
    • 2015
  • Various personalized services are provided based on user context these days, and IoT(Internet of Things) devices provides effective ways to collect user context. For example, user's activity such as walking steps, calories, and sleeping hours can be collected using smart activity tracker. Smart scale can sense change of user's weight or body fat percentage. However, these services are independent to each other and not easy to make them collaborate. Many standard bodies are working on the documents for this issue, but due to diversity of IoT use case scenarios, it seems that multiple IoT technologies co-exist for the time being. This paper propose a framework to collaborate heterogeneous IoT services. The proposed framework provides methods to build application for heterogeneous IoT devices and user context management in more intuitive way using HTTP. To improve compatibility and usability, gathered user contexts are based on MPEG-UD. Implementation of framework and service with real-world devices are also presented.

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.