• Title/Summary/Keyword: user-centric

Search Result 228, Processing Time 0.026 seconds

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

A novel architecture of CCN for better security and applicability (향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구)

  • Sharma, Aashis;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.21-38
    • /
    • 2017
  • Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

CAMAR Companion : Context-aware Mobile AR System for supporting the Personalization of Augmented Content in Smart Space (CAMAR Companion : 스마트 공간에서 증강 콘텐츠의 개인화를 위한 맥락 인식 모바일 증강 현실 시스템)

  • Oh, Se-Jin;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.673-676
    • /
    • 2009
  • In this paper, we describe CAMAR Companoin, a context-aware mobile AR system that provides a user-adaptive assistance with an augmented picture according to the user's context in smart space. It recognizes physical objects and tracks the movement of those objects with a camera embodied to a mobile device. CAMAR Companion observes a mobile user's context, which is sensed by various kinds of sensors in environments, and infers user preference for the content in the situation. It recommends multimedia content relevant to the user's context. It overlays selected content over associated physical objects and enables the user to experience the content in a user-centric manner. Furthermore, we have developed the prototype to illustrate how our system could be used for a mobile user's well-being care applications in smart home environments. In this application, we found that our system could perceive a user preference even though a user's context is changed dynamically, and then adapt the multimedia content with respect to the user's context effectively. As such, the proposed user-adaptive system has the potential to play an important role in developing customized user interfaces in mobile devices.

  • PDF

Electronic Identity Wallet System to Provide User-Centric ID Management Facilities (사용자 중심 ID 관리 기능을 제공하는 전자 ID 지갑 시스템)

  • Jo, Yeong-Seop;Jin, Seung-Heon
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.10-18
    • /
    • 2008
  • 본 고에서는 사용자의 자기 정보 통제권을 강화시키는 전자 ID 지갑 시스템을 기술한다. 전자 ID 지갑 시스템은 ID 정보 제공자로부터 ID 정보 소비자로 유통되는 사용자의 정보를 사용자가 직접 제어할 수 있는 기능을 제공한다. 또한 전자 ID 지갑 시스템은 사용자가 가입한 사이트, 사용자의 크리덴셜 및 사용자의 데이터 공유 정보 등을 사용자에게 모두 카드-기반의 인터페이스로 제공하여 사용자에게 편리함과 일관성을 제공한다. 전자 ID 지갑 시스템은 현재의 웹 환경뿐만 아니라 사용자의 참여와 공유가 더욱 더 중요해지는 웹 2.0 환경에 적합한 사용자 중심 ID 관리 시스템이다.

Design and Implementation of User Centric Mobile Museum Guide System (사용자 중심형 모바일 박물관 안내 시스템의 설계 및 구현)

  • Bu So-Young;Choi Yoo-Joo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.613-615
    • /
    • 2005
  • 최근 인터넷을 통하여 대부분의 박물관들이 새롭고 다양한 멀티미디어 안내 시스템을 시도하고 있지만 박물관 관람시에는 여전히 휴대용 안내기기를 통하여 음성 위주의 단방향 서비스를 제공하고 있다. 이에 본 논문에서는 응용 모바일을 이용하여 관람자에게 다양한 멀티미디어 정보를 웹에서와 같이 양방향 서비스로 제공할 수 있는 시스템을 제안하고자 한다. 또한 응용 모바일의 소형 디스플레이에서도 다량의 멀티미디어 정보를 효과적으로 검색할 수 있는 새로운 사용자 인터페이스를 박물관 안내 시스템에 적용하고자 한다.

  • PDF

A Digital Identity Interchange Framework for User-Centric ID Management (사용자 중심의 ID 관리를 위한 디지털 ID 공유 프레임워크)

  • Cho, S.R.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.6
    • /
    • pp.102-111
    • /
    • 2008
  • 본 고에서는 사용자가 자신의 ID 정보를 효율적으로 공유하기 위한 프레임워크를 정의하고 있다. 프레임워크에는 또한 ID 정보 공유시 문제가 될 수 있는 프라이버시 보호를 강화하기 위한 자기통제 권한을 사용자에게 부여하고 있다. 프레임워크가 제공하는 기능에는 ID 및 크리덴셜 관리, ID 공유 및 동기화, 인증, 인가, 그리고 프라이버시 보호 기능 등이 있다.

Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method (DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계)

  • Kim, Kwang-Sup;Park, Young-Gil;Ro, Soong-Hwan;Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1955-1962
    • /
    • 2012
  • Recently the flow of information security has become a user-centered change. This is mostly breach of security by the normal and abnormal entering harmful files during user internet. Therefore, we would like to design security system that breach of security can be prevented in advance to improve using the reliability of DNS and system control in this paper. In other words, we would like to suggest method can be block randomly to access the site which information security system of user-centric is breached harmful files infected in user computer.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

User-Centric Access Control Service for Blockchain-Based Private Information Management (블록체인 기반의 개인정보 관리를 위한 사용자 중심의 접근제어 서비스)

  • Kim, Seung-Hyun;Kim, Soohyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.341-351
    • /
    • 2021
  • Recently, user-driven privacy control technology, such as distributed ID management, has been gaining attention. However, the existing blockchain-based access control studies have not provided a sufficient level of privacy control method to users. This paper proposes a method that combines permissioned blockchain technology and a recent privacy control standard. To allow users to participate in privacy control, a token-based user access control service that conforms to the UMA2 standard was applied to the blockchain dApp. By combining the blockchain and UMA2, the proposed method provides a user-centered privacy control function that the existing blockchain could not provide. In addition, we solved the problem of privacy, security, and availability of entities, which are the disadvantages of UMA2.

Cache-Friendly Adaptive Video Streaming Framework Exploiting Regular Expression in Content Centric Networks (콘텐트 중심 네트워크에서 정규표현식을 활용한 캐시친화적인 적응형 스트리밍 프레임워크)

  • Son, Donghyun;Choi, Daejin;Choi, Nakjung;Song, Junghwan;Kwon, Ted Taekyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.9
    • /
    • pp.1776-1785
    • /
    • 2015
  • Content Centric Network (CCN) has been introduced as a new paradigm due to a shift of users's perspective of using Internet from host-centric to content-centric. On the other hand, a demand for video streaming has been increasing. Thus, Adaptive streaming has been introduced and researched for achieving higher user's satisfaction. If an architecture of Internet is replaced with CCN architecture, it is necessary to consider adaptive video streaming in CCN according to the demand of users. However, if the same rate decision algorithm used in Internet is deployed in CCN, there are a limitation of utilizing content store (CS) in CCN router and a problem of reflecting dynamic requirements. Therefore, this paper presents a framework adequate to CCN protocol and cache utilization, adapting content naming method of exploiting regular expression to the rate decision algorithm of the existing adaptive streaming. In addition, it also improves the quality of video streaming and verifies the performance through dynamic expression strategies and selection algorithm of the strategies.