• Title/Summary/Keyword: Information activity

Search Result 5,077, Processing Time 0.035 seconds

Training-Free Fuzzy Logic Based Human Activity Recognition

  • Kim, Eunju;Helal, Sumi
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.335-354
    • /
    • 2014
  • The accuracy of training-based activity recognition depends on the training procedure and the extent to which the training dataset comprehensively represents the activity and its varieties. Additionally, training incurs substantial cost and effort in the process of collecting training data. To address these limitations, we have developed a training-free activity recognition approach based on a fuzzy logic algorithm that utilizes a generic activity model and an associated activity semantic knowledge. The approach is validated through experimentation with real activity datasets. Results show that the fuzzy logic based algorithms exhibit comparable or better accuracy than other training-based approaches.

A Study on the Effects of the Information Asset Protection Performance on the Organization Performance: Management Activity and Control Activity (정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Park, Sung-Sik;Kim, Beom-Soo
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.61-77
    • /
    • 2009
  • Recently, enterprises are protecting information assets with the various means of control and management. Nevertheless, they are confronted with the dilemma which the higher securitylevel they request, the lesser efficiency and productivity in short terms they acquire by the inconvenience of business process. In addition, in spite of the steady increase of organization's investment on information protection, the systematic way for the performance measurement of information protection has not been suggested, so that in reality, it is difficult to make the decision to invest on information-protection and elicit the direction to improve it. For this reason, this study intended to establish the concept of the protection and security of information assets of enterprises and to categorize the type of activities to protect information assets into management activity and control activity, and analyze the effects of management activity and control activity for information asset protection on the performance of information asset protection activity and organization. For this research, questionnaire survey was conducted with literature study and the PLS(Partial Least Square) was used to analyze the measurement model and hypotheses testing. The PLS analysis results indicate that management activity for information asset protection affects information asset protection performance. Further, organizational performance is influenced by information asset protection performance. Practical implications of these findings and future research implications are also discussed.

Information and Communication Technologies in the Main Types of Legal Activities

  • Kornev, Arkadiy;Lipen, Sergey;Zenin, Sergey;Tanimov, Oleg;Glazunov, Oleg
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.177-183
    • /
    • 2022
  • Thanks to the informatization of society, complex and high-tech devices are being introduced in all areas of human life, and the latest technologies are being actively improved in the modern, globalizing world. The article deals with the issues of using information and communication technologies in legal activities. It also covers the main types of such activities: law-making, law enforcement, and interpretive activity. Since there is an increase in the flow and accumulation of legal information, it is practically impossible to use traditional methods of working with legal information. The article considers and analyzes the role of information and communication technologies in modern legal activity. It is necessary to reveal the principles, concepts, conditions, and factors of their development and develop theoretical and practical recommendations for the use of such technologies in order to solve legal tasks. The authors of the article raise the issues of increasing the efficiency of legal activity, as well as the integration of information technologies into practical legal activity and their use for collecting, storing, searching, and issuing legal and reference information. Much attention is paid to the specific use of automated data banks and information retrieval systems in legal practice that ensure the accumulation, systematization, and effective search for legally important information. The development of such technologies leads to the creation of comfortable conditions for a lawyer in the course of their professional activity. Currently, legal activity cannot exist without telecommunication technologies, legal reference systems, and electronic programs. The authors believe that due to the use of the latest information technologies, the time for making legal decisions has significantly accelerated, the process of searching and systematizing evidence has been worked out, and it has become possible to quickly and efficiently find information on adopted laws and legal acts.

Health Metrics and Information Behavior: How Users Estimate and Use Self-Quantifying Activity and Health Information

  • Ilhan, Aylin
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.3
    • /
    • pp.47-63
    • /
    • 2020
  • This study focuses on users of activity tracking technologies and their related information behavior. How useful is the provided information by the trackers? Do users understand all information and explanations? We conducted a web-based survey. All in all, 631 users of a tracking device filled out the survey. From the perspective of information science, this investigation aims to analyze information needs considering different types of the provided information by activity tracking technologies. Are users satisfied by using the information on their steps, heart rates, and sleep duration? How do users assess readability about heart rate zones and sleep stages? Additionally, we investigated if users understand how to reflect on and adapt their health behavior based on the received explanations. According to the results, users mainly agree that the received information (raw data as well as - to a lesser extent - aggregated data in the form of corresponding diagrams) is useful, that the explanations are easy to understand, and that they know how to use this obtained information. This investigation enables an in-depth insight into how users are applying the self-quantifying activity and health information and which information needs are satisfied.

A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employees (기업의 정보보안 활동이 구성원의 정보보안 준수의도에 미치는 영향 연구)

  • Jung, Jaewon;Lee, Jung-hoon;Kim, Chae-ri
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.51-59
    • /
    • 2016
  • An internal and external threat against an information system has increased, and to reduce it, organization has spent a great deal of money and manpower. However, in spite of such investment, security threat and trouble have happened continuously. Organization has conducted information security activity through various policies. The study classified such activities into prevention-oriented activity and control-oriented activity, and researched how information security activity of organization affects members of an organization and obeys information security policy by using health belief model. As a result of the study, prevention-oriented activity has a meaningful impact on seriousness, and this seriousness affects compliance intention for information security. Control-oriented activity has a meaningful impact on benefits, and the benefits have an effect on compliance intention. When an organization conducts prior activities such as education, PR, and monitoring, this organization should emphasize negative results that can happened because of deviation. In addition, in case of exposure and punishment through post activities such as inspection and punishment, if the organization emphasizes the positive effects of exposure and punishment rather than emphasis of negative parts, information security activity will be more effective.

Robust Entropy Based Voice Activity Detection Using Parameter Reconstruction in Noisy Environment

  • Han, Hag-Yong;Lee, Kwang-Seok;Koh, Si-Young;Hur, Kang-In
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.205-208
    • /
    • 2003
  • Voice activity detection is a important problem in the speech recognition and speech communication. This paper introduces new feature parameter which are reconstructed by spectral entropy of information theory for robust voice activity detection in the noise environment, then analyzes and compares it with energy method of voice activity detection and performance. In experiments, we confirmed that spectral entropy and its reconstructed parameter are superior than the energy method for robust voice activity detection in the various noise environment.

Navigator Lookout Activity Classification Using Wearable Accelerometers

  • Youn, Ik-Hyun;Youn, Jong-Hoon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.182-186
    • /
    • 2017
  • Maintaining a proper lookout activity routine is integral to preventing ship collision accidents caused by human errors. Various subjective measures such as interviewing, self-report diaries, and questionnaires have been widely used to monitor the lookout activity patterns of navigators. An objective measurement of a lookout activity pattern classification system is required to improve lookout performance evaluation in a real navigation setting. The purpose of this study was to develop an objective navigator lookout activity classification system using wearable accelerometers. In the training session, 90.4% accuracy was achieved in classifying five fundamental lookout activities. The developed model was then applied to predict real-lookout activity in the second session during an actual ship voyage. 86.9% agreement was attained between the directly observed activity and predicted activity. Based on these promising results, the proposed unobstructed wearable system is expected to objectively evaluate navigator lookout patterns to provide a better understanding of lookout performance.

The CAbAT Modeling of Library User Context Information Applying Activity Theory (행위이론을 적용한 도서관 이용자 컨텍스트 정보의 CAbAT 모델링)

  • Lee, Jeong-Soo;Nam, Young-Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.221-239
    • /
    • 2012
  • The information that has been created according to the complex environment and usage pattern of library user can provide context-aware information service through knowledge structuralization on whether it is a suitable situation for user. Accordingly, the development of a context model for defining the various contexts of library user and for the structuralization of interrelated context information is an essential requirement. This study examined the context concept and context modeling, and utilizing the concept of Activity Theory by Engestrom, the activity model of library user was designed as 1) subject, 2) object, 3) tools, 4) divison of labor, 5) community, and 6) rules. In addition, for the purpose of analyzing the context of library user, activity information was tracked to utilize the Shadow Tracking for observing and recording their forms, and the methodology of CAbAT (Context Analysis based on Activity Theory) was utilized for the collected activity information to analyze the user context model.

Intelligent Healthcare Service Provisioning Using Ontology with Low-Level Sensory Data

  • Khattak, Asad Masood;Pervez, Zeeshan;Lee, Sung-Young;Lee, Young-Koo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2016-2034
    • /
    • 2011
  • Ubiquitous Healthcare (u-Healthcare) is the intelligent delivery of healthcare services to users anytime and anywhere. To provide robust healthcare services, recognition of patient daily life activities is required. Context information in combination with user real-time daily life activities can help in the provision of more personalized services, service suggestions, and changes in system behavior based on user profile for better healthcare services. In this paper, we focus on the intelligent manipulation of activities using the Context-aware Activity Manipulation Engine (CAME) core of the Human Activity Recognition Engine (HARE). The activities are recognized using video-based, wearable sensor-based, and location-based activity recognition engines. An ontology-based activity fusion with subject profile information for personalized system response is achieved. CAME receives real-time low level activities and infers higher level activities, situation analysis, personalized service suggestions, and makes appropriate decisions. A two-phase filtering technique is applied for intelligent processing of information (represented in ontology) and making appropriate decisions based on rules (incorporating expert knowledge). The experimental results for intelligent processing of activity information showed relatively better accuracy. Moreover, CAME is extended with activity filters and T-Box inference that resulted in better accuracy and response time in comparison to initial results of CAME.

A Study on Activity Information Accounting Systems : Focusing on Their Flexibilities and Applicabilities (활동정보회계시스템의 구축에 관한 연구 : 유연성과 적용가능성을 중심으로)

  • 신건권
    • The Journal of Information Systems
    • /
    • v.7 no.1
    • /
    • pp.55-76
    • /
    • 1998
  • Various trials to overcome the limitation of current accounting which fails in synchronizing business activities and their information have failed to make satisfactory result merely showing a little saving of processing time. This is because such trials have been done within the boundary of double-entry bookkeeping system. Without consolidating business activities and their information, reformation efforts such as BPR(business process re-engineering), ABC(activity-based costing), CALS(commerce at light speed) etc to fit the business organization to the changing business environment could not be achieved. Overcoming the limitation of accounting takes precedence of any other attempt to construct the management information systems. Activity Information Accounting System(AIAS) proposes the way of overcoming the limitation of current accounting by using the new accounting methodology and unique solution to real time accounting information. AIAS produces accounting and management information directly of activity information without bookkeeping process of activity information. AIAS adopts method of transforming the details of corporation activities directly into accounting information rather than method of double-entry bookkeeping system. The purpose of this paper is to prove AIAS to be very flexible system by using flexibility concepts. Flexibilities are defined as three aspects, namely ① timeliness (rapid accounting information generations and presentations) ② easy systems modificabilities according to environment changes ③ adaptabilities to all industries.

  • PDF