• Title/Summary/Keyword: Recall Environment

Search Result 94, Processing Time 0.027 seconds

The Effects of Information Volume and Distribution on Cognitive Load and Recall: Implications for the Design of Mobile Marker-less Augmented Reality

  • LIM, Taehyeong;BONG, Jiyae;KANG, Ji Hei;DENNEN, Vanessa
    • Educational Technology International
    • /
    • v.20 no.2
    • /
    • pp.137-168
    • /
    • 2019
  • This study examined the effects of information volume and distribution on learners' cognitive load and recall in a mobile augmented reality (AR) environment. Information volume refers to the degree of information users are provided in a learning task, while information distribution indicates the way in which information is distributed, either in a virtual or real format. Sixteen undergraduate students participated in the study, which employed a 2 × 3 randomized block factorial design with repeated measures. Information volume and distribution were independent variables, and factors in learners' cognitive load (mental effort, perceived ease of use, and perceived task difficulty) and recall test scores were the dependent variables. Information volume had significant main effects on perceived ease of use and task difficulty, and recall test scores, while information distribution had significant main effects on perceived task difficulty and test scores. A detailed discussion and implications are provided.

The Effects of Horticultural Activity with Reminiscence Materials and Singing Time on the Ability to Recall Words and Depression in the Elderly with Mild Dementia

  • Kim, Jung Min;Yun, Suk Young;Choi, Byung Jin;Cho, Mun Su
    • Journal of People, Plants, and Environment
    • /
    • v.21 no.6
    • /
    • pp.515-521
    • /
    • 2018
  • The purpose of this study was to investigate the effects of horticultural activities with reminiscence materials and singing songs on the ability to recall words and depression in the elderly with mild dementia. A total of 20 sessions of a horticultural therapy program was held once or twice a week from July 14, 2015 to November 3, 2015 for the elderly with mind dementia at the social welfare center in D city. The subjects of this study were 13 women and the mean age was 81.2 years. The ability to recall words significantly improved from $8.6{\pm}1.8$ before the program to $9.4{\pm}0.6$ after the program (p=.012). However, there was no significant difference in the score of depression after the program. Synergistic effects were generated by applying horticultural activities, singing and reminiscence therapy activities simultaneously, and it was effective in recalling memories. As emotional functions were associated with hormones in vivo, there were emotional ups and downs at each session and short-term alternative therapies were not sufficient to completely eliminate neurotoxic substances caused by dementia.

Adaptive Ontology Matching Methodology for an Application Area (응용환경 적응을 위한 온톨로지 매칭 방법론에 관한 연구)

  • Kim, Woo-Ju;Ahn, Sung-Jun;Kang, Ju-Young;Park, Sang-Un
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.91-104
    • /
    • 2007
  • Ontology matching technique is one of the most important techniques in the Semantic Web as well as in other areas. Ontology matching algorithm takes two ontologies as input, and finds out the matching relations between the two ontologies by using some parameters in the matching process. Ontology matching is very useful in various areas such as the integration of large-scale ontologies, the implementation of intelligent unified search, and the share of domain knowledge for various applications. In general cases, the performance of ontology matching is estimated by measuring the matching results such as precision and recall regardless of the requirements that came from the matching environment. Therefore, most research focuses on controlling parameters for the optimization of precision and recall separately. In this paper, we focused on the harmony of precision and recall rather than independent performance of each. The purpose of this paper is to propose a methodology that determines parameters for the desired ratio of precision and recall that is appropriate for the requirements of the matching environment.

  • PDF

A Study on Unconsciousness Authentication Technique Using Machine Learning in Online Easy Payment Service (온라인 간편 결제 환경에서 기계학습을 이용한 무자각 인증 기술 연구)

  • Ryu, Gwonsang;Seo, Changho;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1419-1429
    • /
    • 2017
  • Recently, environment based authentication technique had proposed reinforced authentication, which generating statistical model per user after user login history classifies into account takeover or legitimate login. But reinforced authentication is likely to be attacked if user was not attacked in past. To improve this problem in this paper, we propose unconsciousness authentication technique that generates 2-Class user model, which trains user's environmental information and others' one using machine learning algorithms. To evaluate performance of proposed technique, we performed evasion attacks: non-knowledge attacker that does not know any information about user, and sophisticated attacker that only knows one information about user. Experimental results against non-knowledge attacker show that precision and recall of Class 0 were measured as 1.0 and 0.998 respectively, and experimental results against sophisticated attacker show that precision and recall of Class 0 were measured as 0.948 and 0.998 respectively.

Study on Design Research using Semantic Network Analysis

  • Chung, Jaehee;Nah, Ken;Kim, Sungbum
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.563-581
    • /
    • 2015
  • Objective: This study was conducted to investigate the potential of sematic network analysis for design research. Background: As HCD (Human-Centered Design) was emphasized, lots of design research methodologies were developed and used in order to find user needs. However, it is still difficult to discover users' latent needs. This study suggests the semantic network analysis as a complementary means for design research, and proved its potential through the practical application, which compares multi-screen purchase and usage behaviors between America and China. Method: We conducted an in-depth interview with 32 consumers from USA and China, and analyzed interview texts through semantic network analysis. Cross cultural differences in purchase and usage behaviors were investigated, based on measuring centrality and community modularity of devices, functions, key buying factors and brands. Results: Americans use more services and functions in the multi-screen environment, compared to Chinese. As a device substitutes other devices, traditional boundaries of the devices are disappearing in the USA. Americans consider function to recall Apple, but Chinese consider function, design and brand to recall Apple, Sony and Samsung as an important brand at the time of their purchase. Conclusion: This study shows the potential of semantic network analysis for design research through the practical application. Semantic network analysis presents how the concepts regarding a theme are structured in the cognitive map of users with visual images and quantitative data. Therefore, it can complement the qualitative analysis of the existing design research. Application: As the design environment becomes more and more complicated like multi-screen environment, semantic network analysis, which is able to provide design insights in the intuitive and holistic perspective, will be acknowledged as an effective tool for further design research.

Machine Learning-Based Transactions Anomaly Prediction for Enhanced IoT Blockchain Network Security and Performance

  • Nor Fadzilah Abdullah;Ammar Riadh Kairaldeen;Asma Abu-Samah;Rosdiadee Nordin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1986-2009
    • /
    • 2024
  • The integration of blockchain technology with the rapid growth of Internet of Things (IoT) devices has enabled secure and decentralised data exchange. However, security vulnerabilities and performance limitations remain significant challenges in IoT blockchain networks. This work proposes a novel approach that combines transaction representation and machine learning techniques to address these challenges. Various clustering techniques, including k-means, DBSCAN, Gaussian Mixture Models (GMM), and Hierarchical clustering, were employed to effectively group unlabelled transaction data based on their intrinsic characteristics. Anomaly transaction prediction models based on classifiers were then developed using the labelled data. Performance metrics such as accuracy, precision, recall, and F1-measure were used to identify the minority class representing specious transactions or security threats. The classifiers were also evaluated on their performance using balanced and unbalanced data. Compared to unbalanced data, balanced data resulted in an overall average improvement of approximately 15.85% in accuracy, 88.76% in precision, 60% in recall, and 74.36% in F1-score. This demonstrates the effectiveness of each classifier as a robust classifier with consistently better predictive performance across various evaluation metrics. Moreover, the k-means and GMM clustering techniques outperformed other techniques in identifying security threats, underscoring the importance of appropriate feature selection and clustering methods. The findings have practical implications for reinforcing security and efficiency in real-world IoT blockchain networks, paving the way for future investigations and advancements.

Audio Segmentation and Classification Using Support Vector Machine and Fuzzy C-Means Clustering Techniques (서포트 벡터 머신과 퍼지 클러스터링 기법을 이용한 오디오 분할 및 분류)

  • Nguyen, Ngoc;Kang, Myeong-Su;Kim, Cheol-Hong;Kim, Jong-Myon
    • The KIPS Transactions:PartB
    • /
    • v.19B no.1
    • /
    • pp.19-26
    • /
    • 2012
  • The rapid increase of information imposes new demands of content management. The purpose of automatic audio segmentation and classification is to meet the rising need for efficient content management. With this reason, this paper proposes a high-accuracy algorithm that segments audio signals and classifies them into different classes such as speech, music, silence, and environment sounds. The proposed algorithm utilizes support vector machine (SVM) to detect audio-cuts, which are boundaries between different kinds of sounds using the parameter sequence. We then extract feature vectors that are composed of statistical data and they are used as an input of fuzzy c-means (FCM) classifier to partition audio-segments into different classes. To evaluate segmentation and classification performance of the proposed SVM-FCM based algorithm, we consider precision and recall rates for segmentation and classification accuracy for classification. Furthermore, we compare the proposed algorithm with other methods including binary and FCM classifiers in terms of segmentation performance. Experimental results show that the proposed algorithm outperforms other methods in both precision and recall rates.

Analysis of young adults sentiments about the image of jan brands and awareness of jean brads under the IMCF economic environment (IMF이후의 신세대 진바지 소비자의 감성이미지 면화와 브랜드 인지도 분석)

  • 이훈자;김칠순;임정호;남영미
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 1998.11a
    • /
    • pp.273-277
    • /
    • 1998
  • The purpose of this study was to develop a large representative data base for jeans marketing strategy. This study was to survey brand awareness and analyze brand image and consumer's seeking image. The 700 questionnaires were distributed and 656 reliable ones were used for statistical analysis. A SAS statistical package including frequency table, factor analysis, analysis of variance, Duncan's multiple range test, Peason's correlation test was used. The results are as follows: 1. Brand awareness involves "brand recall" based on asking a person to name recalled first, and "brand recognition" based on asking to identify brand name from 30 given brands. The result indicated that "Levi" was dominant for brand recall and Guess was dominant for brand recognition. 2. Regarding the brand image, the result showed that "Vov" was best represented for sophisticated 8t trendy brand images, "Storm" for sophisticated brand image, "Jambangee" for reasonable price & comfortable brand images, and "Levis" for classic & design/color brand images. 3. As a result of factor analysis on consumer's seeking image, six factors(characteristic/gay, intelligent/sexy, feminine/sophisticated, active/functional, cute/young, simple/comfortable) were found. Several factors had a relationship with demographic variables, preferred design, fashion interest.

  • PDF

A Study on the Development of YOLO-Based Maritime Object Detection System through Geometric Interpretation of Camera Images (카메라 영상의 기하학적 해석을 통한 YOLO 알고리즘 기반 해상물체탐지시스템 개발에 관한 연구)

  • Kang, Byung-Sun;Jung, Chang-Hyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.499-506
    • /
    • 2022
  • For autonomous ships to be commercialized and be able to navigate in coastal water, they must be able to detect maritime obstacles. One of the most common obstacles seen in coastal area are the farm buoys. In this study, a maritime object detection system was developed that detects buoys using the YOLO algorithm and visualizes the distance and bearing between buoys and the ship through geometric interpretation of camera images. After training the maritime object detection model with 1,224 pictures of buoys, the precision of the model was 89.0%, the recall was 95.0%, and the F1-score was 92.0%. Camera calibration had been conducted to calculate the distance and bearing of an object away from the camera using the obtained image coordinates and Experiment A and B were designed to verify the performance of the maritime object detection system. As a result of verifying the performance of the maritime object detection system, it can be seen that the maritime object detection system is superior to radar in its short-distance detection capability, so that it can be used as a navigational aid along with the radar.

Evaluation of Multi-classification Model Performance for Algal Bloom Prediction Using CatBoost (머신러닝 CatBoost 다중 분류 알고리즘을 이용한 조류 발생 예측 모형 성능 평가 연구)

  • Juneoh Kim;Jungsu Park
    • Journal of Korean Society on Water Environment
    • /
    • v.39 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • Monitoring and prediction of water quality are essential for effective river pollution prevention and water quality management. In this study, a multi-classification model was developed to predict chlorophyll-a (Chl-a) level in rivers. A model was developed using CatBoost, a novel ensemble machine learning algorithm. The model was developed using hourly field monitoring data collected from January 1 to December 31, 2015. For model development, chl-a was classified into class 1 (Chl-a≤10 ㎍/L), class 2 (10<Chl-a≤50 ㎍/L), and class 3 (Chl-a>50 ㎍/L), where the number of data used for the model training were 27,192, 11,031, and 511, respectively. The macro averages of precision, recall, and F1-score for the three classes were 0.58, 0.58, and 0.58, respectively, while the weighted averages were 0.89, 0.90, and 0.89, for precision, recall, and F1-score, respectively. The model showed relatively poor performance for class 3 where the number of observations was much smaller compared to the other two classes. The imbalance of data distribution among the three classes was resolved by using the synthetic minority over-sampling technique (SMOTE) algorithm, where the number of data used for model training was evenly distributed as 26,868 for each class. The model performance was improved with the macro averages of precision, rcall, and F1-score of the three classes as 0.58, 0.70, and 0.59, respectively, while the weighted averages were 0.88, 0.84, and 0.86 after SMOTE application.