scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Inferring emotional state of a user by user profiling

TL;DR: How the profile information is used to get the emotional state of a user and the main issues regarding user profiles are studied from the perspectives of these research fields are studied.
Abstract: User profiles are important in many areas in which it is essential to obtain knowledge about users of software applications. Knowledge about a user includes his likes, dislikes, even his emotional state can be determined by user profiling. In this paper we examine what information constitutes a user profile; and how the profile information is used to get the emotional state of a user. We also study the main issues regarding user profiles from the perspectives of these research fields.
Citations
More filters
Proceedings ArticleDOI
15 Jun 2020
TL;DR: This research tries to identify the monitoring factors and suggests a novel observation solution to create high-performance sensors to generate the user security profile for a home user concerning the user’s privacy.
Abstract: Recognising user’s risky behaviours in real-time is an important element of providing appropriate solutions and recommending suitable actions for responding to cybersecurity threats. Employing user modelling and machine learning can make this process automated by requires high-performance intelligent agent to create the user security profile. User profiling is the process of producing a profile of the user from historical information and past details. This research tries to identify the monitoring factors and suggests a novel observation solution to create high-performance sensors to generate the user security profile for a home user concerning the user’s privacy. This observer agent helps to create a decision-making model that influences the user’s decision following real-time threats or risky behaviours.

Cites background from "Inferring emotional state of a user..."

  • ...1) Public Layer, 2) Private Layer, 3) Personal Layer [2] [17]....

    [...]

  • ...user’s actions tends to be useful to manage user security and privacy but it also could be a significant drawback of user privacy as well [2]....

    [...]

  • ...It could obtain appropriate, adequate and accurate information about a user’s interests and characteristics and demonstrate them with minimal user intervention [2]....

    [...]

Proceedings ArticleDOI
29 Jul 2022
TL;DR: In this article , the authors tackle the issue of delivering personalized information on the Web based on user profile, which is an important stage toward building computers more useful and reachable to a larger audience.
Abstract: This study tackles the issue of delivering personalized information on the Web based on user profile. Personalized data distribution built on customer& document reporting is an important stage toward building computers more useful and reachable to a larger audience. The technique of adapting Web sites to a particular user’s profile in order to make Web browsing easier is known as web customization. The ability of a user to easily identify relevant things or contents is referred to as Web browsing. The main goal of user profiling is to make user actions more efficient by giving more personalized information.
Proceedings ArticleDOI
29 Jul 2022
TL;DR: This study tackles the issue of delivering personalized information on the Web based on user profile to make user actions more efficient by giving more personalized information.
Abstract: This study tackles the issue of delivering personalized information on the Web based on user profile. Personalized data distribution built on customer& document reporting is an important stage toward building computers more useful and reachable to a larger audience. The technique of adapting Web sites to a particular user’s profile in order to make Web browsing easier is known as web customization. The ability of a user to easily identify relevant things or contents is referred to as Web browsing. The main goal of user profiling is to make user actions more efficient by giving more personalized information.
Proceedings ArticleDOI
28 Aug 2019
TL;DR: A framework for obtaining user profile based on collaboration between smart terminal devices and cloud servers is proposed, which reduces the amount of resources consumed on users' phones, while avoiding uploading too much data to the cloud servers.
Abstract: With the increasing popularity of mobile phones, constructing user profile from the usage of mobile phone becomes a critical research interest. Previously, the key of these researches was the improvement of the accuracy of user profiling algorithms. However, most of algorithms are hard to achieve theoretical optimum under practical scenario due to the limited performance of consumer-grade terminal. A common solution is to upload raw user data to cloud server and analyze them on the cloud-side, which leads to the huge consumption of cloud computing resources. In this paper, we propose a framework for obtaining user profile based on collaboration between smart terminal devices and cloud servers. The framework divides the computational flow of the user profiling algorithm into two parts, which will be executed on the phone and on the server respectively. The framework reduces the amount of resources consumed on users' phones, while avoiding uploading too much data to the cloud servers. This paper introduces the principle and structure of the framework. Finally, the framework is compared with a terminal-side frame which perform user profile calculations only using terminal devices and a cloud frame obtaining user profile only using cloud servers.
References
More filters
Proceedings ArticleDOI
17 Oct 2000
TL;DR: An architecture for global customization of web content, by which a web site can customize content for each visitor based on the activities undertaken by the same user on other, unrelated sites, is presented.
Abstract: We present an architecture for global customization of web content, by which a web site can customize content for each visitor based on the activities undertaken by the same user on other, unrelated sites. Our architecture distinguishes itself in the privacy mechanisms it provides: each user controls what information a merchant can learn about her activities at other merchants, and each merchant controls to what other merchants the information it contributes is revealed. To achieve this we introduce novel data protection mechanisms for merchants and users. We further describe aspects of a prototype implementation of our architecture.

36 citations

01 Jan 2001
TL;DR: An initial version of the "Web Host Access Tool", (WHAT) is presented that provides the need for a highly individualistic user context that resides on the client machine and the system that exploits it can then be used in conjunction with a broad range of search services.
Abstract: We describe an approach to personalization that emphasizes the "client side." We posit the need for a highly individualistic user context that resides on the client machine. This context and the system that exploits it can then be used in conjunction with a broad range of search services, from highly specialized and structured digital libraries to the completely undisciplined World Wide Web. We present an initial version of the "Web Host Access Tool", (WHAT) that provides us with a testing suite for personalized search. A data collection system, the "WHAT Observer" is also described that allows us to automatically and efficiently test the veracity of iterations of the WHAT system.

34 citations


"Inferring emotional state of a user..." refers methods in this paper

  • ...This will also require developing and validating tools for automatically determining distinct areas, such as buildings, in a larger space, and for partitioning these areas as necessary for the k-area algorithm [18]....

    [...]

Proceedings ArticleDOI
15 May 2009
TL;DR: Jigsaw Distributed File System (JigDFS) is described which can be used to securely store and retrieve files on a P2P network anonymously and provides users with plausible deniability which enhances privacy.
Abstract: Ubiquitous connectivity and availability of P2P resources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a P2P network anonymously. JigDFS is designed to provide strong encryption and a certain level of plausible deniability. Files in JigDFS are sliced into small segments using an Information Dispersal Algorithm (IDA) and distributed onto different nodes recursively to increase fault tolerance against node failures. Moreover, layered encryption is applied to each file with keys produced by a hashed-key chain algorithm, so that data (file segments) and keys reside on different hosts. In such a scheme, if an attacker compromises a host and retrieves the data, the attacker will still need the correct key to decipher the data. Furthermore, recursive IDA and layered encryption ensure users' anonymity. It is difficult for an adversary to identify who owns a file, even who has retrieved a file in JigDFS. Often, a strong adversary may have the power to monitor the network or even force a user to give up the password. Design of JigDFS provides users with plausible deniability which enhances privacy. When being questioned, a JigDFS user can simply argue that he/she is merely a relaying node, rather than the file owner. Moreover, a user, when forced, can give up a valid, however, incorrect encryption key. There is no way for an adversary to verify either correctness of a key or the identity of file owner. JigDFS is developed using platform independent Java technologies and is envisioned to utilize mobile computing elements such as PDAs and smart phones.

29 citations


"Inferring emotional state of a user..." refers methods in this paper

  • ...[14] shows the clustering and classification techniques using K-means and ANN for mobile content personalization....

    [...]

01 Jan 1966

22 citations