Applying machine learning techniques to improve user acceptance on ubiquitous environement

01/18/2013
by   Djallel Bouneffouf, et al.
0

Ubiquitous information access becomes more and more important nowadays and research is aimed at making it adapted to users. Our work consists in applying machine learning techniques in order to adapt the information access provided by ubiquitous systems to users when the system only knows the user social group, without knowing anything about the user interest. The adaptation procedures associate actions to perceived situations of the user. Associations are based on feedback given by the user as a reaction to the behavior of the system. Our method brings a solution to some of the problems concerning the acceptance of the system by users when applying machine learning techniques to systems at the beginning of the interaction between the system and the user.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/15/2022

Explainable Predictive Process Monitoring: A User Evaluation

Explainability is motivated by the lack of transparency of black-box Mac...
research
08/22/2022

Survey of Machine Learning Techniques To Predict Heartbeat Arrhythmias

Many works in biomedical computer science research use machine learning ...
research
06/21/2020

Applying Machine Learning Techniques for Caching in Edge Networks: A Comprehensive Survey

Edge networks provide access to a group of proximate users who may have ...
research
11/03/2020

Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View

Intelligent Transportation Systems (ITS) cover a variety of services rel...
research
09/09/2014

Co-adaptation in a Handwriting Recognition System

Handwriting is a natural and versatile method for human-computer interac...
research
03/28/2023

Smart Handover with Predicted User Behavior using Convolutional Neural Networks for WiGig Systems

WiGig networks and 60 GHz frequency communications have a lot of potenti...
research
08/16/2021

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Users interacting with a system through UI are typically obliged to perf...

Please sign up or login with your details

Forgot password? Click here to reset