• Title/Summary/Keyword: User pattern

Search Result 1,050, Processing Time 0.024 seconds

The User Motion Pattern Control System for The Simulated Vehicle

  • Kim, Tae-Wan;Lee, Dong-Myung
    • Journal of Engineering Education Research
    • /
    • v.15 no.4
    • /
    • pp.48-52
    • /
    • 2012
  • The purpose of this paper is to design and implement the user motion pattern control system for the simulated vehicle. After analyzing the user motion patterns in the system, the patterns are used to control the moving direction of the simulated vehicle such as forward, backward, turn right, turn left etc. The patterns in the system around are sent to the simulated vehicle in real time. In order to execute the suggested user motion pattern control system, the Kinect is used for executing the system. The Kinect recognizes the specified user motion patterns and it transmits the data to the user motion pattern control system. There are nine kinds of the user motion patterns in the system for controlling the simulated vehicle. In addition to this, some sensors are used to detect the condition of the simulated vehicle. GPS is also used to estimate the current location of the simulated vehicle and to obtain the driving information.

Mobile Web User Interface Patterns for Screen Usage and User Input (화면 활용과 사용자 입력을 위한 모바일 웹 사용자 인터페이스 패턴)

  • Choi, Jong Myung;Lee, Young Ho;Cho, Yong Yun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.183-190
    • /
    • 2012
  • Mobile web applications are different from desktop web applications because of their small screen size and small user input devices. Therefore user interface designers have spent their effort and time to re-design the user interface of mobile web applications to meet these differences. In this paper, we introduce five user interface patterns for mobile web applications to reduce their effort and time. Two of them are for utilizing small screen size efficiently, and they are space overloading pattern and data filtering pattern. These patterns enable designers to reduce screen usage. The other three patterns - data suggestion pattern, input reuse pattern, and incremental data input pattern - are for helping users' data input on mobile devices. These three patterns enable users to reduce direct data input. Our work will help user interface designers develop mobile web interface to utilize screen space efficiently and get data with less errors and less efforts from users.

User Modeling Using User Preference and User Life Pattern Based on Personal Bio Data and SNS Data

  • Song, Hyejin;Lee, Kihoon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.645-654
    • /
    • 2019
  • The purpose of this study was to collect and analyze personal bio data and social network services (SNS) data, derive user preference and user life pattern, and propose intuitive and precise user modeling. This study not only tried to conduct eye tracking experiments using various smart devices to be the ground of the recommendation system considering the attribute of smart devices, but also derived classification preference by analyzing eye tracking data of collected bio data and SNS data. In addition, this study intended to combine and analyze preference of the common classification of the two types of data, derive final preference by each smart device, and based on user life pattern extracted from final preference and collected bio data (amount of activity, sleep), draw the similarity between users using Pearson correlation coefficient. Through derivation of preference considering the attribute of smart devices, it could be found that users would be influenced by smart devices. With user modeling using user behavior pattern, eye tracking, and user preference, this study tried to contribute to the research on the recommendation system that should precisely reflect user tendency.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

Detecting smartphone user habits using sequential pattern analysis

  • Lu, Dang Nhac;Nguyen, Thu Trang;Nguyen, Thi Hau;Nguyen, Ha Nam;Choi, Gyoo Seok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.20-22
    • /
    • 2015
  • Recently, the study of smart phone user habits has become a highly focused topic due to the rapid growth of the smart phone market. Indeed, sequential pattern analysis methods were efficiently used for web-based user habit mining long time ago. However, by means of simulations, it has been observed that these methods might fail for smart phone-based user habit mining. In this paper, we propose a novel approach that leads to a considerably increased performance of the traditional sequential pattern analysis methods by reasonably cutting off each chronological sequence of user logs on a device into shorter ones, which represent the sequential user activities in various periods of a day.

GGenre Pattern based User Clustering for Performance Improvement of Collaborative Filtering System (협업적 여과 시스템의 성능 향상을 위한 장르 패턴 기반 사용자 클러스터링)

  • Choi, Ja-Hyun;Ha, In-Ay;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.17-24
    • /
    • 2011
  • Collaborative filtering system is the clustering about user is built and then based on that clustering results will recommend the preferred item to the user. However, building user clustering is time consuming and also once the users evaluate and give feedback about the film then rebuilding the system is not simple. In this paper, genre pattern of movie recommendation systems is being used and in order to simplify and reduce time of rebuilding user clustering. A Frequent pattern networks is used and then extracts user preference genre patterns and through that extracted patterns user clustering will be built. Through built the clustering for all neighboring users to collaborative filtering is applied and then recommends movies to the user. When receiving user information feedback, traditional collaborative filtering is to rebuild the clustering for all neighbouring users to research and do the clustering. However by using frequent pattern Networks, through user clustering based on genre pattern, collaborative filtering is applied and when rebuilding user clustering inquiry limited by search time can be reduced. After receiving user information feedback through proposed user clustering based on genre pattern, the time that need to spent on re-establishing user clustering can be reduced and also enable the possibility of traditional collaborative filtering systems and recommendation of a similar performance.

Intelligent User Pattern Recognition based on Vision, Audio and Activity for Abnormal Event Detections of Single Households

  • Jung, Ju-Ho;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.59-66
    • /
    • 2019
  • According to the KT telecommunication statistics, people stayed inside their houses on an average of 11.9 hours a day. As well as, according to NSC statistics in the united states, people regardless of age are injured for a variety of reasons in their houses. For purposes of this research, we have investigated an abnormal event detection algorithm to classify infrequently occurring behaviors as accidents, health emergencies, etc. in their daily lives. We propose a fusion method that combines three classification algorithms with vision pattern, audio pattern, and activity pattern to detect unusual user events. The vision pattern algorithm identifies people and objects based on video data collected through home CCTV. The audio and activity pattern algorithms classify user audio and activity behaviors using the data collected from built-in sensors on their smartphones in their houses. We evaluated the proposed individual pattern algorithm and fusion method based on multiple scenarios.

A Statistical Pattern Recognition Method for Providing User Demand in Community Computing (커뮤니티 컴퓨팅에서 사용자 요구 반영을 위한 통계적 패턴 인식 기법)

  • Kim, Sung-Bin;Jung, Hye-Dong;Lee, Hyung-Su;Kim, Seok-Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.287-289
    • /
    • 2009
  • The conventional computing is a centralizing system, but it has been gradually going to develop ubiquitous computing which moves roles away from the main. The Community Computing, a new paradigm, is proposed to implement environment of ubiquitous computing. In this environment, it is important to accept the user demand. Hence in this paper recognizes pattern of user's activity statistically and proposes a method of pattern estimation in community computing. In addition, user's activity varies with time and the activity has the priority We reflect these. Also, we improve accuracy of the method through Knowledge Base organization and the feedback system. We make program using Microsoft Visual C++ for evaluating performance of proposed method, then simulate it. We can confirm it from the experiment result that using proposal method is better in environment of community computing.

  • PDF

Touchless User Interface for Real-Time Mobile Devices (실시간 비접촉 모바일 제어 기법)

  • Jung, Il-Lyong;Nikolay, Akatyev;Jang, Won-Dong;Kim, Chang-Su
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.2
    • /
    • pp.435-440
    • /
    • 2011
  • A touchless user interface system is proposed for real-time mobile devices in this work. The proposed system first recognizes the position of pattern to interact various applications based on the scene taken from mobile camera. Then, the proposed system traces the route of the pattern, which estimates the motion of pattern based on the mean-shift method. Based on this information, we control menu and keypad for the various applications. Differ from other user interface systems, the proposed system provides the new experience to even for the user of low-end mobile without additional hardware. Simulation results demonstrate that the proposed algorithm provides better interaction performances than the conventional method, while achieving real-time user interacting for mobile devices.

Likelihood-based Directional Optimization for Development of Random Pattern Authentication System (랜덤 패턴 인증 방식의 개발을 위한 우도 기반 방향입력 최적화)

  • Choi, Yeonjae;Lee, Hyun-Gyu;Lee, Sang-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.71-80
    • /
    • 2015
  • Many researches have been studied to overcome the weak points in authentication schemes of mobile devices such as pattern-authentication that is vulnerable for smudge-attack. Since random-pattern-lock authenticates users by drawing figure of predefined-shape, it can be a method for robust security. However, the authentication performance of random-pattern-lock is influenced by input noise and individual characteristics sign pattern. We introduce an optimization method of user input direction to increase the authentication accuracy of random-pattern-lock. The method uses the likelihood of each direction given an data which is angles of line drawing by user. We adjusted recognition range for each direction and achieved the authentication rate of 95.60%.