2,340 research outputs found

    User interaction modeling and profile extraction in interactive systems : a groupware application case study

    Get PDF
    Abstract A relevant goal in human-computer interaction is to produce applications that are easy to use and well-adjusted to their users' needs. To address this problem it is important to know how users interact with the system. This work constitutes a methodological contribution capable of identifying the context of use in which users perform interactions with a groupware application (synchronous or asynchronous) and provides, using machine learning techniques, generative models of how users behave. Additionally, these models are transformed into a text that describes in natural language the main characteristics of the interaction of the users with the system.This work was partially supported by project PAC::LFO (MTM2014-55262-P) of Ministerio de Ciencia e InnovaciĂłn (MICINN), Spain. We are grateful to the referees for their constructive input

    A Review on Various Methods of Intrusion Detection System

    Get PDF
    Detection of Intrusion is an essential expertise business segment as well as a dynamic area of study and expansion caused by its requirement. Modern day intrusion detection systems still have these limitations of time sensitivity. The main requirement is to develop a system which is able of handling large volume of network data to detect attacks more accurately and proactively. Research conducted by on the KDDCUP99 dataset resulted in a various set of attributes for each of the four major attack types. Without reducing the number of features, detecting attack patterns within the data is more difficult for rule generation, forecasting, or classification. The goal of this research is to present a new method that Compare results of appropriately categorized and inaccurately categorized as proportions and the features chosen. Data mining is used to clean, classify and examine large amount of network data. Since a large volume of network traffic that requires processing, we use data mining techniques. Different Data Mining techniques such as clustering, classification and association rules are proving to be useful for analyzing network traffic. This paper presents the survey on data mining techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, thereby helping the users to develop secure information systems. Keywords: IDS, Data Mining, Machine Learning, Clustering, Classification DOI: 10.7176/CEIS/11-1-02 Publication date: January 31st 2020

    Exploration Systems:Using Experience Technologies in Automated Exhibition Sites

    Get PDF

    Creating human digital memories with the aid of pervasive mobile devices

    Get PDF
    The abundance of mobile and sensing devices, within our environment, has led to a society in which any object, embedded with sensors, is capable of providing us with information. A human digital memory, created with the data from these pervasive devices, produces a more dynamic and data rich memory. Information such as how you felt, where you were and the context of the environment can be established. This paper presents the DigMem system, which utilizes distributed mobile services, linked data and machine learning to create such memories. Along with the design of the system, a prototype has also been developed, and two case studies have been undertaken, which successfully create memories. As well as demonstrating how memories are created, a key concern in human digital memory research relates to the amount of data that is generated and stored. In particular, searching this set of big data is a key challenge. In response to this, the paper evaluates the use of machine learning algorithms, as an alternative to SPARQL, and treats searching as a classification problem. In particular, supervised machine learning algorithms are used to find information in semantic annotations, based on probabilistic reasoning. Our approach produces good results with 100% sensitivity, 93% specificity, 93% positive predicted value, 100% negative predicted value, and an overall accuracy of 97%

    Personalizing Interactions with Information Systems

    Get PDF
    Personalization constitutes the mechanisms and technologies necessary to customize information access to the end-user. It can be defined as the automatic adjustment of information content, structure, and presentation tailored to the individual. In this chapter, we study personalization from the viewpoint of personalizing interaction. The survey covers mechanisms for information-finding on the web, advanced information retrieval systems, dialog-based applications, and mobile access paradigms. Specific emphasis is placed on studying how users interact with an information system and how the system can encourage and foster interaction. This helps bring out the role of the personalization system as a facilitator which reconciles the user’s mental model with the underlying information system’s organization. Three tiers of personalization systems are presented, paying careful attention to interaction considerations. These tiers show how progressive levels of sophistication in interaction can be achieved. The chapter also surveys systems support technologies and niche application domains

    Creating human digital memories with the aid of pervasive mobile devices

    Get PDF
    The abundance of mobile and sensing devices, within our environment, has led to a society in which any object, embedded with sensors, is capable of providing us with information. A human digital memory, created with the data from these pervasive devices, produces a more dynamic and data rich memory. Information such as how you felt, where you were and the context of the environment can be established. This paper presents the DigMem system, which utilizes distributed mobile services, linked data and machine learning to create such memories. Along with the design of the system, a prototype has also been developed, and two case studies have been undertaken, which successfully create memories. As well as demonstrating how memories are created, a key concern in human digital memory research relates to the amount of data that is generated and stored. In particular, searching this set of big data is a key challenge. In response to this, the paper evaluates the use of machine learning algorithms, as an alternative to SPARQL, and treats searching as a classification problem. In particular, supervised machine learning algorithms are used to find information in semantic annotations, based on probabilistic reasoning. Our approach produces good results with 100% sensitivity, 93% specificity, 93% positive predicted value, 100% negative predicted value, and an overall accuracy of 97%. Crown Copyright © 2013 Published by Elsevier B.V. All rights reserved

    On-line Human Activity Recognition from Audio and Home Automation Sensors: comparison of sequential and non-sequential models in realistic Smart Homes

    No full text
    International audienceAutomatic human Activity Recognition (AR) is an important process for the provision of context-aware services in smart spaces such as voice-controlled smart homes. In this paper, we present an on-line Activities of Daily Living (ADL) recognition method for automatic identification within homes in which multiple sensors, actuators and automation equipment coexist, including audio sensors. Three sequence-based models are presented and compared: a Hidden Markov Model (HMM), Conditional Random Fields (CRF) and a sequential Markov Logic Network (MLN). These methods have been tested in two real Smart Homes thanks to experiments involving more than 30 participants. Their results were compared to those of three non-sequential models: a Support Vector Machine (SVM), a Random Forest (RF) and a non-sequential MLN. This comparative study shows that CRF gave the best results for on-line activity recognition from non-visual, audio and home automation sensors

    Identity Management Framework for Internet of Things

    Get PDF

    ALT-C 2010 - Conference Proceedings

    Get PDF
    • 

    corecore