• Title/Summary/Keyword: Personalized Message

Search Result 25, Processing Time 0.026 seconds

Session Information Transfer Protocol for Exercise between Smart Posters for the Patient's Active Movements (환자의 적극적 이동을 유도하기 위한 스마트 포스터간 운동세션정보 전송프로토콜)

  • Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1439-1446
    • /
    • 2017
  • Steady exercise or walking exercise is helpful for the treatment of chronic diseases or cancers. In this paper, I presented a smart poster to enable the patients to exercise while moving between the smart posters, dynamically, in order to provide better exercise effect to them. It can be a new form of exercise prescription that combines exercise with walking using smart posters. The personalized exercise prescription is downloaded from the management server in real time when the patient approaches, and induces the patient's exercise and walking. In addition, the smart poster helps patient to move to other posters in order to induce more walking exercise. To achieve this, I proposed a transfer protocol that autonomously exchanges session information between smart posters in this paper. Moreover, the smart poster based on Raspberry was implemented to verify validity of this protocol, and an experiment was conducted to measure the request and response time between smart posters in the implemented environment. In the experiment, when the other poster sent the message requesting the exercise session 100 times and received the response message, the 95 percentage of received messages had the response time within 0.05 seconds.

Lip and Voice Synchronization with SMS Messages for Mobile 3D Avatar (SMS 메시지에 따른 모바일 3D 아바타의 입술 모양과 음성 동기화)

  • Youn, Jae-Hong;Song, Yong-Gyu;Kim, Eun-Seok;Hur, Gi-Taek
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.682-686
    • /
    • 2006
  • There have been increasing interests in 3D mobile content service with emergence of a terminal equipping with a mobile 3D engine and growth of mobile content market. Mobile 3D Avatar is the most effective product displaying the character of a personalized mobile device user. However, previous studies on the method of expressing 3D Avatar have been mainly focused on natural and realistic expressions according to the change in facial expressions and lip shape of a character in PC based virtual environments. In this paper, we propose a method of synchronizing the lip shape with voice by applying a SMS message received in mobile environments to 3D mobile Avatar. The proposed method enables to realize a natural and effective SMS message reading service of mobile Avatar by disassembling a received message sentence into units of a syllable and then synchronizing the lip shape of 3D Avatar with the corresponding voice.

  • PDF

Personalized Mobile Junk Message Filtering System (사용자 맞춤형 스팸 문자 필터링 시스템)

  • Lee, Seung-Jae;Choi, Deok-Jai
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.122-135
    • /
    • 2011
  • Mobile spam message is a harmful factor which makes receivers to be annoyed and leads to unnecessary social cost. Unwanted junk messages flowing to a smart phone ruin main purpose of the smart work system to enhance the productivity, so we need to study on this area. In this paper, we proposed a novel spam filter on the smartphone in order to reduce computing process and improve the accuracy rate by feedback of error results to a training sample set. As the spam classifier operates on the smartphone independently with training on only user's received data, it could reflect user preference. The authorized personal computer takes on heavy works, such as preprocessing, feature selecting and training process, and the smartphone takes on light works to block junk messages. Experimental results showed reasonable accuracy rate of over 95%, and we found that the application occupied constant computing resources while running on the phone.

System Development for Flexible Office and Its Efficiency Evaluation Metrics (유연사무환경 지원을 위한 시스템 구축 및 시스템 효과성 측정지표 개발)

  • Choi, Sang-Hyun;Bae, Sungmoon;Han, Kwan-Hee;Park, Juhyun
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.33-45
    • /
    • 2013
  • The trend toward ubiquitous computing does not represent simply a change in the way people access and use information. In the end it will have a profound effect on the way people work with each other. In this paper, we have defined functionalities of an information system that helps operate a kind of smart office environment, and implemented the system using RFID technology. The system provides three major functions-time and attendance management, personalized message notification, and flexible seat allocation for a smart working center. We have also suggested the key performance indicators and performed a KPI analysis to measure an efficiency of implemented system.

PS-Net : Personalized Secure Wi-Fi Networks (PS-Net : 개인별 보안 Wi-Fi 네트워크)

  • Lee, Nam-Seh;Lee, Ju-Ho;Jeong, Choong-Kyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.497-505
    • /
    • 2015
  • Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF

Distribute Intelligent Multi-Agent Technology for User Service in Ubiquitous Environment (유비쿼터스 환경의 사용자 서비스를 위한 분산 지능형 에이전트 기술)

  • Choi, Jung-Hwa;Choi, Yong-June;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.817-827
    • /
    • 2007
  • In the age of ubiquitous environment, huge number of devices and computing services are provided to users. Personalized service, which is modeled according to the character of each and every individual is of particular need. In order to provide various dynamic services according to user's movement, service unit and operating mode should be able to operate automatically with minimum user intervention. In this paper, we discuss the steps of offering approximate service based on user's request in ubiquitous environment. First, we present our simulator designed for modeling the physical resource and computing object in smart space - the infrastructure in ubiquitous. Second, intelligent agents, which we developed based on a FIPA specification compliant multi-agent framework will be discussed. These intelligent agents are developed for achieving the service goal through cooperation between distributed agents. Third, we propose an automated service discovery and composition method in heterogeneous environment using semantic message communication between agents, according to the movement by the user interacting with the service available in the smart space. Fourth, we provide personalized service through agent monitoring anytime, anywhere from user's profile information stored on handhold device. Therefore, our research provides high quality service more than general automated service operation.

Mobile Junk Message Filter Reflecting User Preference

  • Lee, Kyoung-Ju;Choi, Deok-Jai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2849-2865
    • /
    • 2012
  • In order to block mobile junk messages automatically, many studies on spam filters have applied machine learning algorithms. Most previous research focused only on the accuracy rate of spam filters from the view point of the algorithm used, not on individual user's preferences. In terms of individual taste, the spam filters implemented on a mobile device have the advantage over spam filters on a network node, because it deals with only incoming messages on the users' phone and generates no additional traffic during the filtering process. However, a spam filter on a mobile phone has to consider the consumption of resources, because energy, memory and computing ability are limited. Moreover, as time passes an increasing number of feature words are likely to exhaust mobile resources. In this paper we propose a spam filter model distributed between a users' computer and smart phone. We expect the model to follow personal decision boundaries and use the uniform resources of smart phones. An authorized user's computer takes on the more complex and time consuming jobs, such as feature selection and training, while the smart phone performs only the minimum amount of work for filtering and utilizes the results of the information calculated on the desktop. Our experiments show that the accuracy of our method is more than 95% with Na$\ddot{i}$ve Bayes and Support Vector Machine, and our model that uses uniform memory does not affect other applications that run on the smart phone.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.

Virtuality in Digital Fashion Images (디지털 패션영상에 나타난 가상성 연구)

  • Kim, Hyang-Ja;Kim, Young-Sam
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.2
    • /
    • pp.233-246
    • /
    • 2015
  • Focus on Digital Fashion Image, the conceptual framework for the thesis is established from Virtuality in Digital Art. Formative characteristics and aesthetic characteristics were studied by classifying the Digital Fashion Image applied and expressed by digital media and technology. A detective research method was used for a case study. A literature study for case-by-case data was analyzed with focus on the works expressing fashion that utilized digital media and technology since the 2000s. Through this study, the Digital revolution has created the socio-cultural impact of a Virtual representation to implement technology and fashion culture that finds ways to take advantage of the image shown in a Digital Fashion Media by understanding Virtuality. The results are as follows. First, it was a re-formation of the fashion culture through the experience of virtuality with mental zone parameters between the media 'Mediation Code'. Reflect the reality of the virtual environment as represented by a cultural image of fashion brands and fashion that reset the team relationship and formed a Homo Ludens cultural code. Second, 'Interactive Exchange' acts on the exchange interaction between the method of digital technology, the human and the machine as well as the technical interoperability of network elements and techniques. This exchange is applied to fashion images that express emotion. Forming personalized fashion items and the user interactively storage that expresses the interactive exchange to forward the identity of the emotional fashion by a change in the message delivery system fashion. Third, the emphasis on intuitive artistic expression 'Synesthesia Immersion' induces a sense of immersion and excitement through the fusion of the interconnected. Enhance a visual image in fashion sensory representation and maximize a tactile and visual virtual reality involvement.