scholarly journals A personalized multimedia contents recommendation using a psychological model

2012 ◽  
Vol 9 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Won-Ik Park ◽  
Sanggil Kang ◽  
Young-Kuk Kim

With the development and diffusion of compact and portable mobile devices, users can use multimedia content such as music and movie on personal mobile devices, anytime and anywhere. However, even with the rapid development of mobile device technology, it is still not easy to search multimedia content or manage large volume of content in a mobile device with limited resources. To resolve these problems, an approach for recommending content on the server-side is one of the popular solutions. However, the recommendation in a server also leads to some problems like the scalability for a lot of users and the management of personal information. Therefore, this paper defines a personal content manager which acts between content providers (server) and mobile devices and proposes a method for recommending multimedia content in the personal content manager. For the recommendation based on user's personal characteristic and preference, this paper adopts and applies the DISC model which is verified in psychology field for classifying user's behavior pattern. The proposed recommendation method also includes an algorithm for reflecting dynamic environmental context. Through the implements and evaluation of a prototype system, this paper shows that the proposed method has acceptable performance for multimedia content recommendation.

2013 ◽  
Vol 734-737 ◽  
pp. 3214-3219
Author(s):  
Hai Dong Zhong ◽  
Ping Li ◽  
Shao Zhong Zhang ◽  
Wen Ting Yuan ◽  
Xu Dong Zhao ◽  
...  

With the tremendous advances in mobile computing and communication capabilities, rapid proliferation of mobile devices, increasing powerful functions, and decreasing device costs, we are seeing a explosively growth in mobile e-commerce in various consumer and business markets. On the basis of analyzing demands of both buyers and seller in mobile e-commerce, the paper put forward a novel concept and technological framework of Location Based Services (LBS) driven mobile e-commerce. Some LBS related functions, in mobile device terminal, of the prototype system based on the architecture put forward are implemented. Also, some key issues of LBS based mobile e-commerce, such as positioning accuracy and new privacy and security risks, are discussed in detail.


2014 ◽  
Vol 10 (3) ◽  
pp. 243-258 ◽  
Author(s):  
Keum-Sung Hwang ◽  
Sung-Bae Cho

Mobile devices can now handle a great deal of information thanks to the convergence of diverse functionalities. Mobile environments have already shown great potential in terms of providing customized service to users because they can record meaningful and private information continually for long periods of time. The research for understanding, searching and summarizing the everyday-life of human has received increasing attention in recent years due to the digital convergence. In this paper, we propose a mobile life browser, which visualizes and searches human's mobile life based on the contents and context of lifelog data. The mobile life browser is for searching the personal information effectively collected on his/her mobile device and for supporting the concept-based searching method by using concept networks and Bayesian networks. In the experiments, we collected the real mobile log data from three users for a month and visualized the mobile lives of the users with the mobile life browser developed. Some tests on searching tasks confirmed that the result using the proposed concept-based searching method is promising.


Author(s):  
Ankur Gupta ◽  
Purnendu Prabhat ◽  
Arun Sharma

Background: User generated digital content, typically from mobile devices, can be of a personal nature. There have been several instances in which this personal content, including but not limited to, photographs, videos, messages and personal information has been misused by the recipients. The misuse has ranged from violating privacy through unauthorized sharing to manipulating/modifying the original content and finally forgery and fraud. Objective: To create an Advanced Secure Messaging Application (ASMA) allowing personal digital content to be shared across mobile devices in a secure, controlled and privacy preserving manner. The application allows the user to explicitly specify a micro-policy to control the way digital content sent by the user is consumed, shared or modified by the recipient(s). The users should be able to check the veracity of a shared news item besides controlling group formation and enforcing content sharing guidelines within a group. Methods: A micro-policy based novel mechanism is introduced for exercising fine-grained control over the manner in which digital content generated by users is shared and distributed among their contacts. Fact-checking is supported by cross checking the message content against credible news sources. Results: Measurements of message throughput show a consistent and manageable overhead, due to a per message micropolicy travelling with the message data compared to traditional message sharing applications. The high user-ratings received from users in a pilot test establish acceptance of the app and the need for its advanced features. Moreover, the overheads in implementing additional security features are imperceptible at the user level. Conclusion: ASMA is a highly secure and privacy preserving messaging application as demonstrated by experimental results and the pilot usability study. It offers novel security and content control features which are not available in existing mobile messaging applications.


2015 ◽  
Vol 23 (5) ◽  
pp. 450-475 ◽  
Author(s):  
Himanshu Srivastava ◽  
Shashikala Tapaswi

Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them. Design/methodology/approach – Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods. Findings – Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified. Research limitations/implications – The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices. Practical implications – The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation. Originality/value – This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.


2011 ◽  
Vol 268-270 ◽  
pp. 1607-1612
Author(s):  
Hung Ming Chen ◽  
Po Hung Chen ◽  
Yong Zan Liou ◽  
Zhi Xiong Xu ◽  
Yeni Ouyang

This study presents a smart remote controller (SRC) framework for the Android. The Android mobile device acts as the client side of the proposed SRC software. The software uses intuitive dynamic user operation modes to send remote control commands to the controlled side by leveraging the multi-touch events, gesture recognition and hand gesture features of the Android device. The remote controlled server side is based on a Java framework. This facilities portability to PCs or networked information appliances such as Internet TVs, thus, allowing users to establish connections and translate events to control corresponding programs or actions. In this design of the proposed SRC, advanced features are categorized into various modes that can be applied to the scenarios offices and digital homes.


2013 ◽  
Vol 284-287 ◽  
pp. 3418-3422
Author(s):  
Xin Mao Huang ◽  
Ke Yi Kuo ◽  
Yi Chiou

With the popularity and prevalence of mobile devices, they have become indispensable daily necessities. The rapid development of software and hardware technology has made mobile devices increasingly powerful in function. Mobile devices have been inextricably linked with people’s lives. Moreover, as a result of the prevalence of social networking sites, the topic of people’s social relationship mining has attracted the attention of numerous researchers. This paper presented a mobile device-assisted determining social relationship system, which mainly uses the mobile device to collect geographic information about the surrounding people to determine whether they are within the angle of view of the mobile device's camera. The information is stored in the pictures as the basis for people relationship mining. The proposed approach has automatic and rapid processing capabilities for large amounts of photo data.


2019 ◽  
Vol 27 (1) ◽  
pp. 62-80 ◽  
Author(s):  
Vinayak Agrawal ◽  
Shashikala Tapaswi

Purpose The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts. Design/methodology/approach Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted. Findings Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory. Research limitations/implications As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications. Practical implications Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation. Originality/value This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.


Author(s):  
DAVIDE BELLINZONA ◽  
CLAUDIA RAIBULET

Nowadays, mobile devices have an increasing role in the generation and visualization of multimedia content. The issues raised by the management of multimedia content in mobile environments are mostly due to the variety of available devices, their limitations in front of the traditional ones, the network characteristics, the variety of the multimedia content types and formats, as well as to the lack of common standards related to the provisioning of services. In this context, Alembik aims to address these limitations and to provide a framework to transcode and adapt the multimedia content at runtime to the properties of the requiring mobile device. The main keywords which characterize Alembik are: dynamicity, flexibility, extensibility, standardization, user transparency, platform independence, high performance, and open source.


2020 ◽  
Vol 39 (6) ◽  
pp. 8927-8935
Author(s):  
Bing Zheng ◽  
Dawei Yun ◽  
Yan Liang

Under the impact of COVID-19, research on behavior recognition are highly needed. In this paper, we combine the algorithm of self-adaptive coder and recurrent neural network to realize the research of behavior pattern recognition. At present, most of the research of human behavior recognition is focused on the video data, which is based on the video number. At the same time, due to the complexity of video image data, it is easy to violate personal privacy. With the rapid development of Internet of things technology, it has attracted the attention of a large number of experts and scholars. Researchers have tried to use many machine learning methods, such as random forest, support vector machine and other shallow learning methods, which perform well in the laboratory environment, but there is still a long way to go from practical application. In this paper, a recursive neural network algorithm based on long and short term memory (LSTM) is proposed to realize the recognition of behavior patterns, so as to improve the accuracy of human activity behavior recognition.


2020 ◽  
Vol 5 (1) ◽  
pp. 89
Author(s):  
Nasirudin Nasirudin ◽  
Sunardi Sunardi ◽  
Imam Riadi

Technological advances are growing rapidly, including mobile device technology, one of which is an Android smartphone that is experiencing rapid progress with a variety of features so that it can spoil its users, with the rapid development of smartphone technology, many users benefit, but many are disadvantaged by the growing smartphone. technology, so that many perpetrators or persons who commit crimes and seek profits with smartphone facilities. Case simulation by securing Samsung Galaxy A8 brand android smartphone evidence using the MOBILedit forensic express forensic tool with the National Institute of Standards and Technology (NIST) method which consists of four stages of collection, examination, analysis and reporting. The results of testing the Samsung Galaxy A8 android smartphone are carried out with the NIST method and the MOBILedit Forensic Express tool obtained by data backup, extraction and analysis so that there are findings sought for investigation and evidence of crimes committed by persons using android smartphone facilities.


Sign in / Sign up

Export Citation Format

Share Document