Motion Guidance Sleeve: Guiding the Forearm Rotation through External
Artificial Muscles
Did you feel the vibration -- Haptic Feedback Everywhere)
/
Chen, Chia-Yu
/
Chen, Yen-Yu
/
Chung, Yi-Ju
/
Yu, Neng-Hao
Proceedings of the ACM CHI'16 Conference on Human Factors in Computing
Systems
2016-05-07
v.1
p.3272-3276
© Copyright 2016 ACM
Summary: Online fitness videos make it possible and popular to do exercise at home.
However, it is not easy to notice the details of motions by merely watching
training videos. We propose a new type of motion guidance system that simulates
the way that the human body moves as driven by muscle contractions. We have
designed external artificial muscles on a sleeve to create a pulling sensation
that can guide the forearm's pronation (internal rotation) and the forearm's
supination (external rotation). The sleeve consists of stepper motors to
provide pulling force, fishing lines and elastic bands to imitate muscle
contraction to drive the forearm to rotate instinctively. We present two
preliminary experiments. The first one shows that this system can effectively
guide the forearm to rotate in the correct direction. The second one shows that
users can be guided to the targeted angle by utilizing a tactile cue. We also
report users' feedback through the experiments and provide design
recommendations and directions for future research.
Recommending Short-lived Dynamic Packages for Golf Booking Services
Short Papers: Information Retrieval
/
Swezey, Robin
/
Chung, Young-joo
Proceedings of the 2015 ACM Conference on Information and Knowledge
Management
2015-10-19
p.1779-1782
© Copyright 2015 ACM
Summary: We introduce an approach to recommending short-lived dynamic packages for
golf booking services. Two challenges are addressed in this work. The first is
the short life of the items, which puts the system in a state of a permanent
cold start. The second is the uninformative nature of the package attributes,
which makes clustering or figuring latent packages challenging. Although such
settings are fairly pervasive, they have not been studied in traditional
recommendation research, and there is thus a call for original approaches for
recommender systems. In this paper, we introduce a hybrid method that leverages
user analysis and its relation to the packages, as well as package pricing and
environmental analysis, and traditional collaborative filtering. The proposed
approach achieved appreciable improvement in precision compared with baselines.
Exploring determinants of adoption intentions towards Enterprise 2.0
applications: an empirical study
/
Wang, Tao
/
Jung, Chul-Ho
/
Kang, Ming-Hui
/
Chung, Young-Soo
Behaviour and Information Technology
2014-10-03
v.33
n.10
p.1048-1064
© Copyright 2014 Taylor and Francis
Summary: Enterprise 2.0 is identified as one of the most promising technological
innovations in the business domain, with immense potential for enriching
communication, enabling collaboration and facilitating learning. Although
organisations are increasingly implementing Enterprise 2.0 as a useful means of
knowledge sharing and collaboration, no empirical research has been performed
to identify individuals' motivations to participate in Enterprise 2.0
activities. The high practical relevance and dearth of research indicate the
importance of the present study. This study aims to apply the Unified Theory of
Acceptance and Use of Technology to propose a research model that incorporates
context-specific variables as enhancing constructs to predict individuals'
adoption intentions towards Enterprise 2.0 applications. We also categorise
Enterprise 2.0 users into silent and social users and conduct a comparative
analysis to examine whether differences exist in factors predicting users'
adoption intentions towards Enterprise 2.0 applications. To test the model,
structural equation modelling is employed to analyse data collected from
respondents working in seven Chinese companies conducting trial operations of
an Enterprise 2.0 platform. The findings of this research provide managers with
effective methods to promote individuals' participation in Enterprise 2.0
activities. This research also provides a theoretical foundation for academics
and practical implications for the development of Enterprise 2.0.
Quality-Workload Tradeoff in Pig Activity Monitoring Application
Security and Monitoring of WSN
/
Kim, Haelyeon
/
Chung, Yeonwoo
/
Lee, Sungju
/
Chung, Yongwha
/
Park, Daihee
MUSIC 2013: Mobile, Ubiquitous, and Intelligent Computing
2013-09-04
p.105-110
Keywords: Activity Monitoring; Quality; Accuracy; Workload; Tradeoff
© Copyright 2013 Springer-Verlag
Summary: Generally, there is a tradeoff between quality and computational workload
required to obtain that quality. In this paper, we focus on practical issues in
implementing a pig activity monitoring system. We first propose a method for
evaluating the quality-workload tradeoff in the activity monitoring
application. Then, we derive the cost-effective solution within the acceptable
range of quality for the activity monitoring application. Based on the
experiments with the video monitoring data obtained from a pig farm, our method
can derive the cost-effective resolution size and frame rate without degrading
the accuracy significantly.
Power-Time Tradeoff of Parallel Execution on Multi-core Platforms
WSN Applications and Technologies
/
Lee, Sungju
/
Kim, Heegon
/
Chung, Yongwha
MUSIC 2013: Mobile, Ubiquitous, and Intelligent Computing
2013-09-04
p.157-163
Keywords: multi-core platform; energy saving; parallel application
© Copyright 2013 Springer-Verlag
Summary: It is anticipated that high-performance handheld multi-core devices will be
used as WSN processing nodes in the near future. Reducing execution time by
deploying parallel applications on multi-core platforms comes at the cost of
increasing power consumption compared to using fewer cores. This paper focuses
on such tradeoff between power consumption and execution time and subsequently
achieves maximal energy saving when executing applications in parallel. Based
on the experiments on a multi-core platform, we can verify that parallel
execution with frequency scaling is an effective approach at the application
level in order to reduce energy consumption.
Security Enhanced Unlinkable Authentication Scheme with Anonymity for Global
Mobility Networks
Intelligent and Mobile Services
/
Chung, Youngseok
/
Choi, Seokjin
/
Lee, Youngsook
/
Won, Dongho
MUSIC 2013: Mobile, Ubiquitous, and Intelligent Computing
2013-09-04
p.535-540
Keywords: anonymity; linkability; authentication; mobility network
© Copyright 2013 Springer-Verlag
Summary: Recently, Chung, Lee, and Won [1] proposed an improved authentication scheme
with anonymity which remedies security faults showed by Youn, Park, and Lim
[2]. Their improved scheme guarantees anonymity, but does not provide
unlinkability. In their scheme, it is possible for attackers to know particular
sessions, that have already been occurred several times, are originated by one
same user. In this paper, we propose an unlinkable authentication scheme with
anonymity by modifying Chung et al.'s scheme. Our scheme provides not only
anonymity and security as the previous scheme does, but also unlikability
against malicious mobile users. Since proposed scheme still uses only low-cost
functions, it is suitable for mobility networks.
An Overlay Network Based on Arrangement Graph with Fault Tolerance
Frontier Computing -- Theory, Technologies and Applications
/
Lu, Ssu-Hsuan
/
Li, Kuan-Ching
/
Lai, Kuan-Chou
/
Chung, Yeh-Ching
MUSIC 2013: Mobile, Ubiquitous, and Intelligent Computing
2013-09-04
p.577-583
Keywords: Peer-to-Peer; overlay network; arrangement graph; fault tolerance
© Copyright 2013 Springer-Verlag
Summary: As people change the habit of using the Internet, network technology has
become matured. Unlike client-server, peer-to-peer (P2P) technology increases
the convenience of people's daily life. The routing efficiency of P2P system
without centralized server always is an important issue. This paper proposes a
virtual peer mechanism of P2P overlay network based on the arrangement graph to
make exiting physical peers be agent peers for vacant peers. Each vacant peer
is managed by a physical peer who often is its neighbor, and the vacant peer is
called virtual peer. Physical peers and virtual peers make the arrangement
graph full, and make the number of routing hops can be limited within the
diameter of the arrangement graph. From experimental results, this system can
keep routing efficiency no matter the number of peers and do not increase
system overhead.
Finding food entity relationships using user-generated data in recipe
service
Information retrieval poster session
/
Chung, Young-joo
Proceedings of the 2012 ACM Conference on Information and Knowledge
Management
2012-10-29
p.2611-2614
© Copyright 2012 ACM
Summary: Rakuten recipe is a recipe site where users can submit their recipes and
share with the others. Since recipe contents are generated by users, they
usually contain many misspellings, abbreviations, synonyms, hypernyms and
hyponyms. Identifying and normalizing these words is essential to retrieve
relevant recipes to user's request. In this paper, we introduce a new approach
to finding related words in a recipe domain using the data structure. Based on
the observation that people usually write the main ingredient in the first
position of ingredient lists of each recipe and such a ingredient is strongly
related to the categories where recipes belong, we calculate relation scores of
word pairs using real service data, which contains 790 categories and 405,519
recipes. The experimental result showed that we successfully found semantically
related word pairs with f-score of 0.93.
Detection of Wheelchair User Activities Using Wearable Sensors
Ambient Assisted Living and Smart Environments
/
Ding, Dan
/
Hiremath, Shivayogi
/
Chung, Younghyun
/
Cooper, Rory A.
UAHCI 2011: 6th International Conference on Universal Access in
Human-Computer Interaction, Part III: Context Diversity
2011-07-09
v.3
p.145-152
Keywords: Activity monitors; wearable sensors; activity classification; wheelchair
users; rehabilitation
Copyright © 2011 Springer-Verlag
Summary: Wearable sensors are increasingly used to monitor and quantify physical
activity types and levels in a real-life environment. In this project we
studied the activity classification in manual wheelchair users using wearable
sensors. Twenty-seven subjects performed a series of representative activities
of daily living in a semi-structured setting with a wheelchair propulsion
monitoring device (WPMD) attached to their upper limb and their wheelchair. The
WPMD included a wheel rotation datalogger that collected wheelchair movements
and an eWatch that collected tri-axial acceleration on the wrist. Features were
extracted from the sensors and fed into four machine learning algorithms to
classify the activities into three and four categories. The results indicated
that these algorithms were able to classify these activities into three
categories including self propulsion, external pushing, and sedentary activity
with an accuracy of 89.4-91.9%.
SPIDER: a system for scalable, parallel / distributed evaluation of
large-scale RDF data
Demo session 2: semantic web, information extraction & knowledge
management
/
Choi, Hyunsik
/
Son, Jihoon
/
Cho, YongHyun
/
Sung, Min Kyoung
/
Chung, Yon Dohn
Proceedings of the 2009 ACM Conference on Information and Knowledge
Management
2009-11-02
p.2087-2088
© Copyright 2009 ACM
Summary: RDF is a data model for representing labeled directed graphs, and it is used
as an important building block of semantic web. Due to its flexibility and
applicability, RDF has been used in applications, such as semantic web,
bioinformatics, and social networks. In these applications, large-scale graph
datasets are very common. However, existing techniques are not effectively
managing them. In this paper, we present a scalable, efficient query processing
system for RDF data, named SPIDER, based on the well-known parallel/distributed
computing framework, Hadoop. SPIDER consists of two major modules (1) the graph
data loader, (2) the graph query processor. The loader analyzes and dissects
the RDF data and places parts of data over multiple servers. The query
processor parses the user query and distributes sub queries to cluster nodes.
Also, the results of sub queries from multiple servers are gathered (and
refined if necessary) and delivered to the user. Both modules utilize the
MapReduce framework of Hadoop. In addition, our system supports some features
of SPARQL query language. This prototype will be foundation to develop real
applications with large-scale RDF graph data.
An Improved H.264 Error Concealment Algorithm with User Feedback Design
Part IV: Interactive TV and Media
/
Chen, XiaoMing
/
Chung, Yuk Ying
HCI International 2007: 12th International Conference on Human-Computer
Interaction, Part III: HCI Intelligent Multimodal Interaction Environments
2007-07-22
v.3
p.815-820
Keywords: H.264; Error Concealment; User Feedback; Video Compression
Copyright © 2007 Springer-Verlag
Summary: This paper proposes a new Error Concealment (EC) method for the H.264/AVC
[1] video coding standard using both spatial and temporal information for
intra-frame concealment. Five error concealing modes are offered by this
method. The proposed EC method also allows feedback from users. It allows users
to define and change the thresholds for switching between five different modes
during the error concealing procedure. As a result, the concealing result for a
video sequence can be optimized by taking advantage of relevant user feedback.
The concealed video quality has been measured by a group of users and compared
with the H.264 EC method which is without user feedback. The experimental
results show that the proposed new EC algorithm with the user feedback performs
better (3 dB gains) than the H.264 EC without user feedback.
Implementation of a New H.264 Video Watermarking Algorithm with Usability
Test
Part IV: Interactive TV and Media
/
Shukran, Mohd Afizi Mohd
/
Chung, Yuk Ying
/
Chen, XiaoMing
HCI International 2007: 12th International Conference on Human-Computer
Interaction, Part III: HCI Intelligent Multimodal Interaction Environments
2007-07-22
v.3
p.963-970
Keywords: Video watermarking; H.264; Human Computer Interface (HCI)
Copyright © 2007 Springer-Verlag
Summary: With the proliferation of digital multimedia content, issues of copyright
protection have become more important because the copying of digital video does
not result in the decrease in quality that occurs when analog video is copied.
One method of copyright protection is to embed a digital code, "watermark",
into the video sequence. The watermark can then unambiguously identify the
copyright holder of the video sequence. In this paper, we propose a new video
watermarking algorithm for the H.264 coded video with considering usability
factors. The usability testings based on the concept of Human Computer
Interface (HCI) have been performed on the proposed approach. The usability
testing has been considered representative for most image manipulations and
attacks. The proposed algorithm has passed all the attack testings. Therefore,
the watermarking mechanisms in this paper have been proved to be robust and
efficient to protect the copyright of H.264 coded video.
Constructing Adaptive User Interface Through Semantic Descriptions
People with Disabilities: Assistive Homes and Environments
/
Namgoong, Hyun
/
Kim, Kyung-il
/
Chung, Yun Koo
ICCHP'06: International Conference on Computers Helping People with Special
Needs
2006-07-11
p.469-472
© Copyright 2006 Springer-Verlag
Summary: We present semantic descriptions for dynamically integrated usage of the
devices providing user-centric services. This paper describes the architecture
of the user-side controller for adaptive user interface supporting control of
the devices. It provides users with easy interface for controlling
heterogeneous devices in environment. Especially, it is efficient for people
with disabilities to operate the surrounding devices. Furthermore, it can be
applied to automated home control and proactive service system, etc.
Monitoring and managing presence in incoming and outgoing communication
Late breaking results: short papers
/
Chung, Yuan-Chou
/
Zimmerman, John
/
Forlizzi, Jodi
Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems
2005-04-02
v.2
p.1284-1287
© Copyright 2005 ACM
Summary: The increase in channels and formats of personal communication such as
email, instant messaging, and mobile phones, has generated new problems both
with selecting the appropriate method to contact someone and communicating a
preference for incoming communication. Some applications, such as instant
messaging have partially addressed this problem with status and away messages,
but this approach offers limited communication options and only works for this
communication channel. Following a user-centered design approach, we explored
the needs of users to manage their communication channels. Using diaries,
observations, and directed story-telling interviews we generated a set of
observed needs. We then generated concept scenarios that capture these needs
and performed a concept validation with a focus group looking for an overlap
between our observed needs and the focus groups perceived needs. This paper
documents our findings and offers implications for designers addressing these
communication needs.
Robotic walker interface: designing for the elderly
Late breaking posters
/
Shklovski, Irina
/
Chung, Yuan-Chou
/
Adams, Rob
Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems
2004-04-24
v.2
p.1566
© Copyright 2004 ACM
Semantic Indexing for a Complete Subject Discipline
IR / Multimedia
/
Chung, Yi-Ming
/
He, Qin
/
Powell, Kevin
/
Schatz, Bruce
DL'99: Proceedings of the 4th ACM International Conference on Digital
Libraries
1999-08-11
p.39-48
© Copyright 1999 ACM
Automatic Subject Indexing Using an Associative Neural Network
/
Chung, Yi-Ming
/
Pottenger, William M.
/
Schatz, Bruce R.
DL'98: Proceedings of the 3rd ACM International Conference on Digital
Libraries
1998-06-23
p.59-68
Keywords: Automatic indexing, Semantic indexing, Semantic retrieval, Automatic subject
assignment, Amateur indexing, Concept Space, Information retrieval, Interspace,
Semantic locality
© Copyright 1998 ACM
Summary: The global growth in popularity of the World Wide Web has been enabled in
part by the availability of browser based search tools which in turn have led
to an increased demand for indexing techniques and technologies. As the amount
of globally accessible information in community repositories grows, it is no
longer cost-effective for such repositories to be indexed by professional
indexers who have been trained to be consistent in subject assignment from
controlled vocabulary lists. The era of amateur indexers is thus upon us, and
the information infrastructure needs to provide support for such indexing if
search of the Net is to produce useful results.
In this paper, we propose the ConceptAssigner, an automatic subject indexing
system based on a variant of the Hopfield network [13]. In the application
discussed herein, a collection of documents is used to automatically create a
subset of a thesaurus termed a Concept Space [4]. To automatically index an
individual document, concepts extracted from the given document become the
input pattern to a Concept Space represented as a Hopfield network. The
Hopfield net parallel spreading activation process produces another set of
concepts that are strongly related to the concepts of the input document. Such
concepts are suitable for use in an interactive indexing environment.
A prototype of our automatic subject indexing system has been implemented as
part of the Interspace, a semantic indexing and retrieval environment which
supports statistically-based semantic indexing in a persistent object
environment.
The Itsy Bitsy Spider
Posters
/
Chen, Hsinchun
/
Schatz, Bruce R.
/
Ramsey, Marshall
/
Chung, Y-Ming
DL'97: Proceedings of the 2nd ACM International Conference on Digital
Libraries
1997-07-23
p.258
© Copyright 1997 ACM