• Title/Summary/Keyword: user daily lives

Search Result 70, Processing Time 0.022 seconds

A Study on Daily Lives of the Disabled in Residential Facilities -Focusing on Daily Life Activities and Interactions by the Daily Time use Method- (거주시설 성인 지적장애인의 일상에 관한 연구 -생활시간조사를 활용한 일상생활활동과 상호작용 분석을 중심으로-)

  • Kim, Mi-Ok;Kim, Go-Eun
    • Korean Journal of Social Welfare
    • /
    • v.62 no.1
    • /
    • pp.317-342
    • /
    • 2010
  • The purpose of this study is to investigate daily lives of the intellectually disabled living in residential facilities. The daily time use method that monitors and records 24 hours of the subject was used for the analysis of daily lives of the institutionalized disabled and verbal interaction patterns within each facility. In particular, the analysis focused on 'frequency of activities' and 'lives', with the method of time budget. Based on the activity category table of the 2004 nationwide Time Use Survey, the analysis aimed to identify differences and similarities between the non-disabled and the disabled in terms of daily time use. The interaction pattern analysis method on grounds of the Flanders Category system(1963) indicates the level, the type, and the full details of interaction between the institutionalized disabled and the living rehabilitation teachers. This study is all the more significant in that it monitored the daily lives of the institutionalized disabled for the first time to allow in-depth understanding about the daily lives of the disabled; analyzed interaction patterns between the institutionalized disabled and living rehabilitation teachers; applied time budget study method, a frequently used one in adjacent fields, and therefore should serve as a valuable source material for future studies.

  • PDF

Intelligent Pattern Recognition Algorithms based on Dust, Vision and Activity Sensors for User Unusual Event Detection

  • Song, Jung-Eun;Jung, Ju-Ho;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.95-103
    • /
    • 2019
  • According to the Statistics Korea in 2017, the 10 leading causes of death contain a cardiac disorder disease, self-injury. In terms of these diseases, urgent assistance is highly required when people do not move for certain period of time. We propose an unusual event detection algorithm to identify abnormal user behaviors using dust, vision and activity sensors in their houses. Vision sensors can detect personalized activity behaviors within the CCTV range in the house in their lives. The pattern algorithm using the dust sensors classifies user movements or dust-generated daily behaviors in indoor areas. The accelerometer sensor in the smartphone is suitable to identify activity behaviors of the mobile users. We evaluated the proposed pattern algorithms and the fusion method in the scenarios.

Intelligent User Pattern Recognition based on Vision, Audio and Activity for Abnormal Event Detections of Single Households

  • Jung, Ju-Ho;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.59-66
    • /
    • 2019
  • According to the KT telecommunication statistics, people stayed inside their houses on an average of 11.9 hours a day. As well as, according to NSC statistics in the united states, people regardless of age are injured for a variety of reasons in their houses. For purposes of this research, we have investigated an abnormal event detection algorithm to classify infrequently occurring behaviors as accidents, health emergencies, etc. in their daily lives. We propose a fusion method that combines three classification algorithms with vision pattern, audio pattern, and activity pattern to detect unusual user events. The vision pattern algorithm identifies people and objects based on video data collected through home CCTV. The audio and activity pattern algorithms classify user audio and activity behaviors using the data collected from built-in sensors on their smartphones in their houses. We evaluated the proposed individual pattern algorithm and fusion method based on multiple scenarios.

Review of Biometrics-Based Authentication Techniques in Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.321-327
    • /
    • 2021
  • Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.

A Comparative Analysis of Application User Experience for Record and Recall -Focused on Google Timeline and 'Daily' (Application)- (기록과 회상에 대한 애플리케이션 사용자 경험 비교분석 -구글 타임라인과 '일상' (애플리케이션)을 중심으로-)

  • Ko, Eun-Sung;Kim, Bo-Yeun
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.233-239
    • /
    • 2020
  • Due to the development of digital technology, users can record their daily lives without being restricted by time and space. The trend is growing rapidly, but lifelogging cases are still insufficient. Google's Timeline and domestic application 'Daily' were analyzed through in-depth interviews. Based on the Creating Pleasurable Interface Model, the factors influencing user satisfaction were identified by the Reckard 7-point scale based on the Honeycomb model. The results of the in-depth interviews and the 7-point scale were similar, and we could see what and why users preferred the recording application. This study is meaningful to evaluate the user experience for recording application and analyzing the needs of users obtained through in-depth interviews to assess the usability that provide a service record and recall.

A Study on User Satisfaction and Continuity Usage Intention in the Automotive Industry: Focusing on the Expectation Confirmation Model (자동차 산업에서의 사용자만족과 지속사용의도에 관한 연구: 기대일치모형을 중심으로)

  • Han, Sang In;Chang, Seog Ju
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.5
    • /
    • pp.189-203
    • /
    • 2021
  • Environmental changes, which are strongly requiring technological cooperation, such as technological development and strategic alliances according to industrial ecosystem change, have a significant impact on not only product quality but also services. Thus, there is a need for 'servitization' that can satisfy the needs of customers and the ecosystem of businesses through the convergence of manufacturing companies and services. This study uses the Expectation-Confirmation Model to examine the impact on user satisfaction and Continuance Usage Intention. Research(Study) was conducted on users who are using high-tech-based cars. For this, we used Expectation Confirmation(match expections for the user's pre-and post-use relationships), Perceived Ease, Perceived Usefulness, User Satisfaction and Habitual Use and using Continuance Usage Intention as a dependent variable. Their causation was examined with the spss 26.0 and smartpls 2.0 statistical programs. As implications of this study, Expectation Confirmation has been shown to have significant positive effects on Perceived Ease, Perceived Usefulness, User Satisfaction and Habitual Use. For this results, the expectations before and after the use of high-tech cars lead to improved daily lives convenience and(or) work efficiency, leading to user satisfaction and further Continuance Usage Intention. Motors consider it important to pursue the work improvements that consumers want and use it useful in daily lives in the production and sale of high-tech cars. It is expected that it will create natural habits for services that users are satisfied with, and that these habits will affect the continuous growth and understanding of the trend of change.

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment (스마트홈 환경에서 패스워드 추측 공격에 안전한 개선된 3PAKE 기법에 대한 연구)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1471-1481
    • /
    • 2016
  • As concern about IoT is increasing recently, various IoT services are being launched. Smart home is closely related to our daily life by combining IoT with user's residential space. Therefore, if an unauthorized user accesses a device inside a Smart home, it can cause more serious damage to user as it is related with daily lives. For instance executing the command allowing unauthenticated access for the internal locking device can be a real harm to user's property like a home invasion. To prevent this problem, this paper introduces 3PAKE Techniques, which provides authenticated Key exchange through Home gateway using Password-based Authenticated Key Exchange(PAKE).

An Exploratory Study of Consumer's Participation and Diffusion of Internet UCC-based on Digital Contents Services (인터넷 UCC 기반 디지털콘텐츠 서비스의 소비자 참여와 확산에 관한 연구)

  • Kim, Yeon-Jeong
    • Journal of Families and Better Life
    • /
    • v.27 no.3
    • /
    • pp.201-212
    • /
    • 2009
  • The purpose of research is to investigate patterns and diffusion of consumer participation on Internet UCC based on digital contents services. A sample survey of internet users was conducted, responses were collected from 629 respondents and consumer streaming data were analyzed. Some of the practical implications of the results are follows. Research can find out that patterns of user participation in UCC. The major genres of UCC are like daily lives of individuals, humors, parodies of star entertainers and types of contents like still pictures or images, texts are relatively highly generated comparing with multimedia UCC. Although participants have been being increased in UCC recently, the consumers as prosumers who are classified in contents generating group are ten percents at the most. In generating community-based UCC such as posting answers of questions and activities in Blog, prosumers who are in contents making group(recreational group) show more positive attitudes than simple participants(consuming only). The results of multiple regression analysis indicated that fun & entertainment, arousal, self-expression, user friendly web interface variable commonly posited a significant effect in multimedia UCC Services between two groups. Information sharing and perceived usefulness posited a significant effect in recreational group.

Factors Affecting User's Behavior of Smartphone: Integrated Model of Service Distribution, Addiction and Consequence

  • LEE, Won-Jun;SHIN, Luke Yunkeun
    • Journal of Distribution Science
    • /
    • v.20 no.11
    • /
    • pp.99-108
    • /
    • 2022
  • Purpose: The wide distribution of smartphones has changed life and user behavior. This phenomenon has both advantages and disadvantages for users. As smartphones become a part of our daily lives, smartphone addiction has recently become a social issue in many countries. This study explores factors that affect smartphone addiction and the consequences of addictive behaviors. Research design, data and methodology: Our model hypothesizes that four key factors determine addictive behavior: flow, enjoyment, preference for online social life, and escape reality. Commitment and compulsive use are mediating variables that connect key drivers and addictive results. Based on the SEM (structural equation model) analysis of 497 survey responses, these four driving factors each have a significant effect on the compulsive use of smartphones directly or indirectly; the compulsive use of smartphones directly influences the three results Results: We conducted a reliability and validity analysis, and the results were successful. In the hypothesis test, every path is accepted as expected at the significance level of 0.05. Conclusions: Among the four driving factors, escape reality is the vital factor influencing smartphone addiction and its consequences. And anxiety is the number one consequence influenced by the compulsive use of smartphones.