This document discusses recognizing happiness from mobile phone data. Researchers collected call logs, text messages, and Bluetooth data from 117 subjects over 10 months. They extracted features related to phone usage, diversity of contacts, activity levels, and regularity. The top features were personality traits, weather data, and Bluetooth proximity. A random forest classifier recognized daily happiness with 80% accuracy based on these features, approaching methods using multiple data modes. Future work should focus on multi-step model development.
1) The document describes a smart doorbell system that uses image recognition to identify visitors and control access to a home.
2) A Raspberry Pi connected to a camera captures images of visitors and compares them to a database of authorized individuals.
3) If the image matches someone in the database, the door will automatically unlock, but if not, an alert message will be sent to the homeowner. The system aims to remotely monitor and control home security.
This document describes a mobile app called the Women Security App developed by a group of students to help ensure women's safety. The app allows a user to save their contact details and then activate a "widget" that can instantly alert contacts and share the user's location if they feel unsafe. It also records audio from the user's surroundings and sends the recording along with a text message and GPS coordinates to the designated contact. The app aims to help women get assistance quickly in dangerous situations.
This document describes a smart child safety monitoring system that uses GPS, GSM technology, and an Arduino microcontroller to track a child's location and heartbeat. The system consists of modules to detect location using GPS, measure heartbeat, and allow communication between the child's device and a parent's phone via SMS text. It periodically updates the child's real-time location and heartbeat on an Android application. This allows parents to monitor their child's status and location from a distance using their phone. The goal is to provide reliable monitoring of children's safety through an IoT-based wearable device.
The document describes an intelligence security system for women that was developed for a hackathon. The system uses a bi-camera setup to detect threats and alert authorities. Camera 1 detects the number of people and triggers Camera 2 if more than one is detected. Camera 2 performs gender and facial expression recognition, and will sound an alarm if a female shows fear, disgust or sadness. The location is then sent to nearby police stations and women's help centers via SMS and email. MATLAB is used to simulate facial expression recognition using eigenfaces. An AngularJS user interface displays the detected location on a map. The system was built using Spring framework, J2EE, REST APIs and MySQL database.
This document describes the design and implementation of a security system for banks using voice recognition. The system uses a voice acknowledgment module placed at the gate of bank lockers to recognize authorized users based on their voice frequency response. The module can be programmed to allow two users for greater flexibility. A smart camera is used to monitor activity in the building for safety and security purposes. All sensors are controlled by an Arduino board. The system provides greater security than traditional key-based systems and only allows valid individuals to access lockers using a password for protection. It was concluded that the voice recognition security system was successful in providing improved bank locker security.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document describes a safety jacket system for women that uses various modules like GPS, GSM, a camera, shock circuit, buzzer, and memory card connected to a Raspberry Pi module.
2) When the second button is pressed, the GPS tracks the location and sends it along with an alert message to predefined phone numbers. The shock circuit and camera activate to injure attackers and capture images of them that are saved to the memory card.
3) The system aims to allow women to protect themselves and alert others in emergency situations without needing to use a smartphone. It provides real-time location tracking, self-defense capabilities, and evidence collection to aid in finding attackers.
This document describes an Android application project for women's safety. The app allows a woman in danger to easily alert friends and authorities by sending her location. It works by having the user save contact numbers and a default message. Then a single touch can send the message along with GPS coordinates. If the recipients don't respond, automatic calls will be placed to each one. The project aims to provide a low-cost GPS tracking solution using mobile phones to track a person's location in real time on a map. It communicates location data via GPRS to help prevent issues like harassment and assault.
1) The document describes a smart doorbell system that uses image recognition to identify visitors and control access to a home.
2) A Raspberry Pi connected to a camera captures images of visitors and compares them to a database of authorized individuals.
3) If the image matches someone in the database, the door will automatically unlock, but if not, an alert message will be sent to the homeowner. The system aims to remotely monitor and control home security.
This document describes a mobile app called the Women Security App developed by a group of students to help ensure women's safety. The app allows a user to save their contact details and then activate a "widget" that can instantly alert contacts and share the user's location if they feel unsafe. It also records audio from the user's surroundings and sends the recording along with a text message and GPS coordinates to the designated contact. The app aims to help women get assistance quickly in dangerous situations.
This document describes a smart child safety monitoring system that uses GPS, GSM technology, and an Arduino microcontroller to track a child's location and heartbeat. The system consists of modules to detect location using GPS, measure heartbeat, and allow communication between the child's device and a parent's phone via SMS text. It periodically updates the child's real-time location and heartbeat on an Android application. This allows parents to monitor their child's status and location from a distance using their phone. The goal is to provide reliable monitoring of children's safety through an IoT-based wearable device.
The document describes an intelligence security system for women that was developed for a hackathon. The system uses a bi-camera setup to detect threats and alert authorities. Camera 1 detects the number of people and triggers Camera 2 if more than one is detected. Camera 2 performs gender and facial expression recognition, and will sound an alarm if a female shows fear, disgust or sadness. The location is then sent to nearby police stations and women's help centers via SMS and email. MATLAB is used to simulate facial expression recognition using eigenfaces. An AngularJS user interface displays the detected location on a map. The system was built using Spring framework, J2EE, REST APIs and MySQL database.
This document describes the design and implementation of a security system for banks using voice recognition. The system uses a voice acknowledgment module placed at the gate of bank lockers to recognize authorized users based on their voice frequency response. The module can be programmed to allow two users for greater flexibility. A smart camera is used to monitor activity in the building for safety and security purposes. All sensors are controlled by an Arduino board. The system provides greater security than traditional key-based systems and only allows valid individuals to access lockers using a password for protection. It was concluded that the voice recognition security system was successful in providing improved bank locker security.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document describes a safety jacket system for women that uses various modules like GPS, GSM, a camera, shock circuit, buzzer, and memory card connected to a Raspberry Pi module.
2) When the second button is pressed, the GPS tracks the location and sends it along with an alert message to predefined phone numbers. The shock circuit and camera activate to injure attackers and capture images of them that are saved to the memory card.
3) The system aims to allow women to protect themselves and alert others in emergency situations without needing to use a smartphone. It provides real-time location tracking, self-defense capabilities, and evidence collection to aid in finding attackers.
This document describes an Android application project for women's safety. The app allows a woman in danger to easily alert friends and authorities by sending her location. It works by having the user save contact numbers and a default message. Then a single touch can send the message along with GPS coordinates. If the recipients don't respond, automatic calls will be placed to each one. The project aims to provide a low-cost GPS tracking solution using mobile phones to track a person's location in real time on a map. It communicates location data via GPRS to help prevent issues like harassment and assault.
This document describes different types of smart wrist watches that have embedded cell phone capabilities. It discusses three main types: watches with keypads, watches with smart applications, and watches running the Android operating system. It provides examples and comparisons of features for each type, such as price, design, battery life, and multimedia/connectivity options. The document also proposes additional health-related functions the watches could incorporate, such as blood testing, diabetes monitoring, and calculators for metrics like BMI, BMR, and calorie counting. It concludes the wrist watch can function like a mobile phone and that future concepts could further develop health and technical capabilities while considering economic and technical feasibility.
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
This document describes a mobile app called I Safe Apps that aims to improve women's safety. The app allows women in danger to easily alert emergency contacts and share their location with one button. It also provides first aid instructions and information on how to use fake phone calls or video calls to avoid dangerous situations. The app seeks to address issues like physical assaults and rapes that many women face. It could help women who experience accidents, attacks, or other dangers when traveling alone notify others and get assistance.
This document describes a project report for a GSM based e-notice board. It includes an introduction that provides an overview of the project, describing information transfer and system components. It also includes sections on literature survey, problem definition, system requirements specification, system modelling and design, implementation, testing, and conclusion. The project involved interfacing a GSM modem, LCD display, and microcontroller to allow notices to be sent via SMS and displayed on the board. It was implemented at the institute level as a proposal.
This document proposes and describes a women's safety mobile application for Android. It includes sections on the proposed system, hardware requirements, system diagrams, use case diagrams, and development kits. The app would allow users to activate an emergency alarm, make fake phone calls for safety, track friends' locations, and send distress signals and locations to emergency contacts. Diagrams show the system architecture and data flows between app functions, users, and emergency contacts. The conclusion states that the app provides an easy-to-use interface for emergency tools that can work both online and offline.
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
This document summarizes a research paper on a child safety and tracking management system using mobile phones. The system allows parents to monitor their child's location in real-time using GPS and set up geographical boundaries. It also allows children to send emergency SMS messages with their location if needed. The system is designed as an Android application to take advantage of the GPS, geo-fencing, and SMS capabilities on Android phones. It aims to help parents keep their children safe by knowing their locations and setting alerts if they leave approved areas.
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
IoT based Environmental Monitoring and Control SystemIJMREMJournal
IoT plays a major role in collecting the information from the sensing unit enclosing our environment due to
alterations in the climate which led to the significance of environmental monitoring. This Paper presents a
development of real time environmental monitoring and control system by utilizing Node MCU, DHT11 sensor,
ACS712 current sensor, Thing Speak (Open IoT analytics service) and Blynk application. The main task of
monitoring parameters (Humidity, temperature and power consumption) with real time sensors is done by Thing
Speak continuously which has API (Application programming Interface) for gathering sensed data and enabling
users to observe the monitored data in graphs for an interval of every 15 seconds.
This project is also designed to control home devices sitting at any place in the world by utilizing power
efficiently through Blynk application which is used to read data from sensors located in home environment using
smart phone and to turn on/off heating and cooling appliances automatically with respect to room temperature
values.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
This presentation is based upon final year project supervised under the premises of cummins college of engineering for women, pune, on IoT based Accident Detection & Tracking System and also contributing towards smart healthcare sector, by initiating theologies of research or the ways of research can be taken out in this area aswell, to make this system further more intelligent on predictions conducted from the studies of statistics and machine learning, to automate this research from data log and system can be made smart supervisory, to contribute towards smart healthcare sector.
smart city - smart healthcare sector- industry 4.0
Advancement in Android Authentication System Using Direct Significance ServiceIRJET Journal
This document describes a proposed advancement in the Android authentication system using a Direct Significance Service. The system would allow users to locate a smart phone's position and receive alerts based on time and location through an application installed on the smart phone. The application uses the smart phone's GPS and SMS/email services to periodically share the device's location with registered contacts. It notifies contacts if an unknown location is detected or if the wrong password is entered. The system aims to allow family members to track each other's locations through their smart phones for safety purposes.
The most of the technical challenges for the society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with a prototype as a way of finding a solution to the visually impaired. The navigation assistant technology using RFID Tag Grid minimizes the dependency. The reader used in this system is embedded in the mobile and shoes to avoid dependency on travel. The RFID reader matches with the information specified to that ID and a voice signal is generated. Wireless RF links is placed in the Bluetooth device/ headphone for voice guidance. The proximity sensing unit is an auxiliary unit is added as a solution to address unexpected and non-mapped obstacles in the user’s path. Basically it contains ultrasonic Sensor Unit interfaced with microcontroller which is inter-linked to a vibrator that would be activated when nearing obstacles. This system is technically and economically feasible and may offer a maximum benefit to the disabled.
This document describes an SMS-based mobile technology project that allows users to remotely access data from their mobile phone via text messages. The proposed system allows users to retrieve contact information from their address book or view unread SMS messages by sending text commands from another phone. It uses SMS and GSM technology to communicate between a mobile phone and a computer program. The system was designed and developed using Android and Eclipse and demonstrates how SMS can be used for remote querying and retrieval of mobile phone data. It provides a simple way to access important contact or message information from another device when a user's primary mobile phone is unavailable. The project aims to simplify accessing contact numbers or messages in urgent situations without having physical access to the original device.
IRJET - Face Recognition Door Lock using IoTIRJET Journal
This document presents a face recognition door lock system using IoT. The system uses a Raspberry Pi connected to a camera to capture images of people at the door. When the doorbell is rung, the camera takes a picture and the image is checked against images stored in a database. If the image matches someone in the database, the door will open. If no match is found, the image is sent to an IoT website where the owner can log in from anywhere and decide whether to lock or unlock the door by looking at the image of the person. The system aims to provide security and convenience while minimizing human intervention. It discusses related work on face recognition algorithms, presents the system design using blocks diagrams and flowcharts,
Real Time Head & Hand Tracking Using 2.5D Data Harin Veera
This document provides an overview of installing Linux on the Mini 6410 single board computer. It discusses the necessary components which include the bootloader, kernel, and root file system. The Supervivi bootloader and Linux kernel are used. The root file system is the Qtopia root file system specific to Mini 6410. These components are loaded onto the NOR flash of the Mini 6410 board to enable it to run Linux. Additionally, application programs can be loaded onto the NAND flash. The DNW tool is used to load the components via USB. Once installed, the Mini 6410 can run applications based on the program loaded in NAND flash. The document also provides details about the hardware specifications of the Mini 6410
Internet of Things Based Women Tracking and Security with Auto-Defender Systemrahulmonikasharma
In worldwide situation, the prime inquiry in each woman mind is about her safety and the badgering issues. Women everywhere throughout the world are confronting much deceptive physical provocation. The main idea frequenting each woman is the point at which they will have the capability to move frankly in the city even in odd hours without stressing over their security. Our task is a dare to determine this issue. This paper describes about a smart intelligent security system for women. This venture concentrates on a security for women so they will never feel vulnerable. The system comprises of different modules such as GPS receiver, shock circuit, buzzer, spray mechanism, Webcam, pulse rate sensor, Raspberry pi-3 module. Today there are many cases which are going on about women all over in the world. It was high time where women required a change. This task depends on women security where women feel ensured. This venture portrays about safety electronic system for women, worked out in the open transport vehicles such as, car, buses and auto-rickshaws as these days women are being at molested, kidnapped and badgering by the drivers. In each field there is an uncommon effect of women like games, dance, training, business, in legislative issues moreover. Women are driving in each field. The question arises that, Are the women in India are extremely secured? Always get the solution No. Henceforth executed Internet of Things based women tracking and security with auto-defender system which is interfaced with Raspberry pi 3 board that will track the location of the women also will auto defend in bad situation.
A presentation on cutting edge Western psychological research into \"what makes people happy?\" and the timeless knowledge of Bhagavad-gita in this area.
This document discusses happiness at work and evidence-based interventions to increase happiness. It defines happiness at work and lists reasons why happy employees are beneficial for organizations. Research shows the top factors that make people happy at work are friendly colleagues, enjoyable work, a good boss, work-life balance, and varied work. The document discusses different happiness interventions that are evidence-based, such as cognitive behavioral therapy, physical activity, optimism, gratitude, and mindfulness. More research is still needed but interventions like HeartMath that target the emotional brain directly may be more effective than those only targeting the neocortex.
The document discusses why happiness at work matters and how it impacts productivity. Key points include:
1) Happier employees are more focused on their tasks, take less sick leave, and stay at their jobs longer than less happy colleagues.
2) The main drivers of happiness at work are achieving one's potential through using their strengths, skills, and overcoming challenges.
3) Research shows that happiness increases productivity - the happiest employees focus more on tasks, have less sick leave, and are more likely to stay in their jobs. Increasing employee happiness could gain a company thousands of extra productive days each year.
Do you feel like you often don’t get the things you really want
Do you feel like God’s denying you these things or maybe like he’s not even listening to you?
What makes you happy?
This document outlines a lesson plan on happiness and unhappiness. It defines key terms related to each concept like delighted, grateful, depressed, and frustrated. The lesson includes introducing the vocabulary, differentiating between happiness and unhappiness, exercises for students to practice the new words, and acting out the emotions.
Pathways to Happiness are policy suggestions for communities using the Happiness Index and scoring low in an area. Each one suggests policies and programs for when a community scores low in one area.
An examination of three traits encouraged by social networks--narcissism, insecurity, and isolation--that lead to negative behaviours among users and, ultimately, unhappiness.
This document describes different types of smart wrist watches that have embedded cell phone capabilities. It discusses three main types: watches with keypads, watches with smart applications, and watches running the Android operating system. It provides examples and comparisons of features for each type, such as price, design, battery life, and multimedia/connectivity options. The document also proposes additional health-related functions the watches could incorporate, such as blood testing, diabetes monitoring, and calculators for metrics like BMI, BMR, and calorie counting. It concludes the wrist watch can function like a mobile phone and that future concepts could further develop health and technical capabilities while considering economic and technical feasibility.
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
This document describes a mobile app called I Safe Apps that aims to improve women's safety. The app allows women in danger to easily alert emergency contacts and share their location with one button. It also provides first aid instructions and information on how to use fake phone calls or video calls to avoid dangerous situations. The app seeks to address issues like physical assaults and rapes that many women face. It could help women who experience accidents, attacks, or other dangers when traveling alone notify others and get assistance.
This document describes a project report for a GSM based e-notice board. It includes an introduction that provides an overview of the project, describing information transfer and system components. It also includes sections on literature survey, problem definition, system requirements specification, system modelling and design, implementation, testing, and conclusion. The project involved interfacing a GSM modem, LCD display, and microcontroller to allow notices to be sent via SMS and displayed on the board. It was implemented at the institute level as a proposal.
This document proposes and describes a women's safety mobile application for Android. It includes sections on the proposed system, hardware requirements, system diagrams, use case diagrams, and development kits. The app would allow users to activate an emergency alarm, make fake phone calls for safety, track friends' locations, and send distress signals and locations to emergency contacts. Diagrams show the system architecture and data flows between app functions, users, and emergency contacts. The conclusion states that the app provides an easy-to-use interface for emergency tools that can work both online and offline.
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
This document summarizes a research paper on a child safety and tracking management system using mobile phones. The system allows parents to monitor their child's location in real-time using GPS and set up geographical boundaries. It also allows children to send emergency SMS messages with their location if needed. The system is designed as an Android application to take advantage of the GPS, geo-fencing, and SMS capabilities on Android phones. It aims to help parents keep their children safe by knowing their locations and setting alerts if they leave approved areas.
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
This document describes a door lock control system that uses wireless biometrics. The system uses fingerprint recognition technology to unlock a door. An Arduino board controls a servo motor that locks and unlocks the door. It communicates wirelessly with an Android application over Bluetooth. When a matching fingerprint is detected by the app, it sends a signal to the Arduino board to unlock the door by turning the servo motor. This provides secure, contactless access to doors without requiring keys. The system aims to provide biometric security access at a lower cost than traditional solutions.
IoT based Environmental Monitoring and Control SystemIJMREMJournal
IoT plays a major role in collecting the information from the sensing unit enclosing our environment due to
alterations in the climate which led to the significance of environmental monitoring. This Paper presents a
development of real time environmental monitoring and control system by utilizing Node MCU, DHT11 sensor,
ACS712 current sensor, Thing Speak (Open IoT analytics service) and Blynk application. The main task of
monitoring parameters (Humidity, temperature and power consumption) with real time sensors is done by Thing
Speak continuously which has API (Application programming Interface) for gathering sensed data and enabling
users to observe the monitored data in graphs for an interval of every 15 seconds.
This project is also designed to control home devices sitting at any place in the world by utilizing power
efficiently through Blynk application which is used to read data from sensors located in home environment using
smart phone and to turn on/off heating and cooling appliances automatically with respect to room temperature
values.
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
The security system is essential for occupants' convenience and protection from intruders and fire. Theft and fire are the most important requirement for the security system. The advancement of wireless sensor networks using IoTs increased the features in a security system and play an important role in daily life. In this paper, the proposed system is divided into two units. The first one about security which use to take snapshots by a camera whenever there is fire or intruders in the security zone and mail it to the owner every three seconds by using Arduino configured with MATLAB program. MATLAB program plays the main role to coordinate between sensors and to turn on/off the cameras. The second unit is about controlling the appliances and also the main door by using AVR microcontroller configured by CVAVR software that connected with Bluetooth sensor and controlled by a smartphone by using the implementation software built-up in the smartphone. To arrival of the control unit, the user should send code from the software implementation to the framework that use to turn on/off the devices or open/close the door. This proposed system is designed and implemented in details in this paper.
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
This presentation is based upon final year project supervised under the premises of cummins college of engineering for women, pune, on IoT based Accident Detection & Tracking System and also contributing towards smart healthcare sector, by initiating theologies of research or the ways of research can be taken out in this area aswell, to make this system further more intelligent on predictions conducted from the studies of statistics and machine learning, to automate this research from data log and system can be made smart supervisory, to contribute towards smart healthcare sector.
smart city - smart healthcare sector- industry 4.0
Advancement in Android Authentication System Using Direct Significance ServiceIRJET Journal
This document describes a proposed advancement in the Android authentication system using a Direct Significance Service. The system would allow users to locate a smart phone's position and receive alerts based on time and location through an application installed on the smart phone. The application uses the smart phone's GPS and SMS/email services to periodically share the device's location with registered contacts. It notifies contacts if an unknown location is detected or if the wrong password is entered. The system aims to allow family members to track each other's locations through their smart phones for safety purposes.
The most of the technical challenges for the society to detect and find a solution for visually impaired, with increased security and service motto towards the society helped to bring a solution which would help the visually impaired in the industries and other companies. Here we had come out with a prototype as a way of finding a solution to the visually impaired. The navigation assistant technology using RFID Tag Grid minimizes the dependency. The reader used in this system is embedded in the mobile and shoes to avoid dependency on travel. The RFID reader matches with the information specified to that ID and a voice signal is generated. Wireless RF links is placed in the Bluetooth device/ headphone for voice guidance. The proximity sensing unit is an auxiliary unit is added as a solution to address unexpected and non-mapped obstacles in the user’s path. Basically it contains ultrasonic Sensor Unit interfaced with microcontroller which is inter-linked to a vibrator that would be activated when nearing obstacles. This system is technically and economically feasible and may offer a maximum benefit to the disabled.
This document describes an SMS-based mobile technology project that allows users to remotely access data from their mobile phone via text messages. The proposed system allows users to retrieve contact information from their address book or view unread SMS messages by sending text commands from another phone. It uses SMS and GSM technology to communicate between a mobile phone and a computer program. The system was designed and developed using Android and Eclipse and demonstrates how SMS can be used for remote querying and retrieval of mobile phone data. It provides a simple way to access important contact or message information from another device when a user's primary mobile phone is unavailable. The project aims to simplify accessing contact numbers or messages in urgent situations without having physical access to the original device.
IRJET - Face Recognition Door Lock using IoTIRJET Journal
This document presents a face recognition door lock system using IoT. The system uses a Raspberry Pi connected to a camera to capture images of people at the door. When the doorbell is rung, the camera takes a picture and the image is checked against images stored in a database. If the image matches someone in the database, the door will open. If no match is found, the image is sent to an IoT website where the owner can log in from anywhere and decide whether to lock or unlock the door by looking at the image of the person. The system aims to provide security and convenience while minimizing human intervention. It discusses related work on face recognition algorithms, presents the system design using blocks diagrams and flowcharts,
Real Time Head & Hand Tracking Using 2.5D Data Harin Veera
This document provides an overview of installing Linux on the Mini 6410 single board computer. It discusses the necessary components which include the bootloader, kernel, and root file system. The Supervivi bootloader and Linux kernel are used. The root file system is the Qtopia root file system specific to Mini 6410. These components are loaded onto the NOR flash of the Mini 6410 board to enable it to run Linux. Additionally, application programs can be loaded onto the NAND flash. The DNW tool is used to load the components via USB. Once installed, the Mini 6410 can run applications based on the program loaded in NAND flash. The document also provides details about the hardware specifications of the Mini 6410
Internet of Things Based Women Tracking and Security with Auto-Defender Systemrahulmonikasharma
In worldwide situation, the prime inquiry in each woman mind is about her safety and the badgering issues. Women everywhere throughout the world are confronting much deceptive physical provocation. The main idea frequenting each woman is the point at which they will have the capability to move frankly in the city even in odd hours without stressing over their security. Our task is a dare to determine this issue. This paper describes about a smart intelligent security system for women. This venture concentrates on a security for women so they will never feel vulnerable. The system comprises of different modules such as GPS receiver, shock circuit, buzzer, spray mechanism, Webcam, pulse rate sensor, Raspberry pi-3 module. Today there are many cases which are going on about women all over in the world. It was high time where women required a change. This task depends on women security where women feel ensured. This venture portrays about safety electronic system for women, worked out in the open transport vehicles such as, car, buses and auto-rickshaws as these days women are being at molested, kidnapped and badgering by the drivers. In each field there is an uncommon effect of women like games, dance, training, business, in legislative issues moreover. Women are driving in each field. The question arises that, Are the women in India are extremely secured? Always get the solution No. Henceforth executed Internet of Things based women tracking and security with auto-defender system which is interfaced with Raspberry pi 3 board that will track the location of the women also will auto defend in bad situation.
A presentation on cutting edge Western psychological research into \"what makes people happy?\" and the timeless knowledge of Bhagavad-gita in this area.
This document discusses happiness at work and evidence-based interventions to increase happiness. It defines happiness at work and lists reasons why happy employees are beneficial for organizations. Research shows the top factors that make people happy at work are friendly colleagues, enjoyable work, a good boss, work-life balance, and varied work. The document discusses different happiness interventions that are evidence-based, such as cognitive behavioral therapy, physical activity, optimism, gratitude, and mindfulness. More research is still needed but interventions like HeartMath that target the emotional brain directly may be more effective than those only targeting the neocortex.
The document discusses why happiness at work matters and how it impacts productivity. Key points include:
1) Happier employees are more focused on their tasks, take less sick leave, and stay at their jobs longer than less happy colleagues.
2) The main drivers of happiness at work are achieving one's potential through using their strengths, skills, and overcoming challenges.
3) Research shows that happiness increases productivity - the happiest employees focus more on tasks, have less sick leave, and are more likely to stay in their jobs. Increasing employee happiness could gain a company thousands of extra productive days each year.
Do you feel like you often don’t get the things you really want
Do you feel like God’s denying you these things or maybe like he’s not even listening to you?
What makes you happy?
This document outlines a lesson plan on happiness and unhappiness. It defines key terms related to each concept like delighted, grateful, depressed, and frustrated. The lesson includes introducing the vocabulary, differentiating between happiness and unhappiness, exercises for students to practice the new words, and acting out the emotions.
Pathways to Happiness are policy suggestions for communities using the Happiness Index and scoring low in an area. Each one suggests policies and programs for when a community scores low in one area.
An examination of three traits encouraged by social networks--narcissism, insecurity, and isolation--that lead to negative behaviours among users and, ultimately, unhappiness.
The document discusses how happiness is a choice and within our control through our state of mind and willingness to change. It summarizes research that found the top factors for happiness are strong relationships, having purpose and meaning, helping others, and a sense of control. While genetics and circumstances influence happiness, up to 40% is determined by intentional activities. The brain can rewire itself, so we can overcome ruts and change habits to enhance positive moods and lasting happiness.
1) The document discusses how Tony Hsieh, CEO of Zappos, focuses on creating a strong company culture, vision, and higher purpose centered around delivering happiness to both customers and employees.
2) It recommends spending 10% of time studying the science of happiness and how understanding happiness can help businesses and individuals.
3) Research shows that having a vision and sense of higher purpose beyond just profits or money is linked to greater happiness. The document urges examining one's goals in life and higher purpose.
International Happiness Day - What Makes You Happy At Work? Hppy
The document is a collection of responses from various individuals about what makes them happy at work on International Happiness Day. It includes short quotes from over 30 people from different organizations and industries talking about things like working with inspiring colleagues, having autonomy and creativity, helping others, and being part of a company with a positive culture and mission.
Happiness at Work- the 5 Most Important ThingsEd Redard, MD
What are the 5 most important things for a great work environment and healthy working relationships? Is it good pay, benefits, advancement opportunities, or a great job title? The answer of what is REALLY important for happiness at work may surprise you!
Personality Lingo offers a unique method of identifying each persons personality style and the personality style of those with whom you work. Understanding and appreciating our styles authentic values, strengths and stressors if the first step to a harmonious work environment.
Learn how to facilitate this activity and much more in the Personality Lingo Basic Training Kit - Certification is optional! The Personality Lingo Basic Training Kit gives EVERYTHING a trainer needs to facilitate a 3 hour presentation including a training manual, slide show, personality test, and reproducible participant handouts.
To learn more go to: http://personalitylingo.com/personalitytrainingcertificationkit/
This white paper examines the topic of employee happiness and engagement. It discusses how employee turnover and motivation impact business metrics like revenue and culture. While compensation is an important driver of engagement, employees also value work-life balance. Some companies are trying to improve engagement through perks, workplace flexibility, and creating positions focused on talent management and happiness. Tracking engagement allows companies to identify issues and priorities for building strategies to retain top talent.
Digital communication refers to any message passed through digital devices and includes examples like email, texting, fax, videoconferencing. The document discusses the advantages and disadvantages of various digital communication methods, noting that while digital options allow for fast, low-cost communication over large distances, they also come with risks like technical issues, information misuse, and electronic waste. Common digital communication tools covered include email, texting, faxing, teleconferencing, and videoconferencing.
The document discusses positive psychology and factors related to happiness. It notes that rates of issues like divorce, teen suicide, crime, and depression have increased significantly from 1960 to 2000. Research shows that happiness is associated with benefits like better health, relationships, job performance, and longevity. Studies found that optimistic older adults had half the heart attack rates of less optimistic peers. The document advocates cultivating optimism, gratitude, and kindness to increase happiness and resilience.
Predictive Modeling of Human Behavior: Supervised Learning from Telecom Metad...Andrey Bogomolov
Big data, specifically Telecom Metadata, opens new opportunities for human behavior understanding, applying machine learning and big data processing computational methods combined with interdisciplinary knowledge of human behavior. In this thesis new methods are developed for human behavior predictive modeling based on anonymized telecom metadata on individual level and on large scale group level, which were studied during research projects held in 2012-2016 in collaboration with Telecom Italia, Telefonica Research, MIT Media Lab and University of Trento. It is shown that human dynamics patterns could be reliably recognized based on human behavior metrics derived from the mobile phone and cellular network activity (call log, sms log, bluetooth interactions, internet consumption).
On individual level the results are validated on use cases of detecting daily stress and estimating subjective happiness. An original approach is introduced for feature extraction, selection, recognition model training and validation. Experimental results based on ensemble stochastic classification and regression tree models are discussed. On large group level, following big data for social good challenges, the problem of crime hotspot prediction is formulated and solved. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month. Electric energy consumption patterns are correlated with human behavior patterns in highly nonlinear way. Second large scale group behavior prediction result is formulated as predicting next week energy consumption based on human dynamics analysis derived out of the anonymized and aggregated telecom data, processed from GSM network call detail records (CDRs). The proposed solution could act on energy producers/distributors as an essential aid to smart meters data for making better decisions in reducing total primary energy consumption by limiting energy production when the demand is not predicted, reducing energy distribution costs by efficient buy-side planning in time and providing insights for peak load planning in geographic space. All the studied experimental results combine the introduced methodology, which is efficient to implement for most of multimedia and real-time applications due to highly reduced low-dimensional feature space and reduced machine learning pipelines. Also the indicators which have strong predictive power are discussed opening new horizons for computational social science studies.
The document provides details about Abdul Azeem's 6-week summer training at Electrocus Solution on "Internet of Things (IOT)". It includes a certificate, declaration, acknowledgement, abstract and contents. The training covered embedded system architecture, designing and implementing embedded systems, and fundamentals of Arduino and IOT. Key topics included microcontrollers, sensors like ultrasonic and soil moisture, programming with Arduino IDE, and characteristics and applications of IOT.
The document summarizes the Blue Eye Technology, which aims to give computers human-like perceptual and sensory abilities. It discusses how the technology uses non-obtrusive sensors like cameras and microphones to recognize users and understand their actions, emotions, and needs. The Simple User Interest Tracker (SUITOR) is highlighted as an application that can observe users and fetch more relevant information based on what they are viewing. In conclusion, the technology promises to make human-computer interaction more convenient and personalized by simplifying tasks through adaptive sensing capabilities.
The document is an agenda for the Cyber Defense Initiative Conference 2011 being held from March 20-21, 2012 in Bangkok, Thailand. The conference theme is "Is Your Privacy at Risk? Security and Privacy Challenges in the Digital Modernity." The agenda includes discussions on mobile challenges for enterprises, what to look for in mobile device management (MDM) solutions, advanced threats over networks, and advanced network analysis tools. It also provides questions to consider when evaluating MDM solutions and discusses the need for intelligence-driven security and best-of-breed solutions to address evolving cyber threats.
This document discusses research challenges in the Internet of Things (IoT). It begins by defining IoT and describing its key components like sensing, embedded systems, cloud computing, and analytics. It then discusses several application areas like healthcare, automotive, retail, and more. The document outlines the complex IoT architecture involving various stakeholders. It also discusses technical challenges in areas like distributed computing, communication protocols, data storage, analytics, privacy and security. Finally, it provides an overview of Tata Consultancy Services' Innovation Lab in Kolkata, including its research areas, projects, publications, awards and references.
1) The document discusses the Industrial Internet of Things (IIoT) and envisions connecting 50-700 billion devices to the internet by 2025, accounting for 50% of the global economy.
2) It describes Telefonica's Thinking Things hardware platform for building IoT solutions using modular sensor and connectivity components.
3) The platform provides global cellular connectivity, an easy-to-use interface for managing devices, and aims to simplify development and deployment of IoT solutions for customers across various industries.
This document provides an overview of embedded systems and discusses Arduino. It defines an embedded system as a combination of hardware and software designed for a specific function. Embedded systems are commonly based on microcontrollers and are optimized for their dedicated tasks. Examples of embedded systems include appliances, vehicles, medical devices, and more. The document then discusses the Arduino platform as an example of an embedded system and how it can be programmed using its IDE software.
The document discusses various topics related to human, computer, and vulnerability such as profiling mobile users, intelligence, related works on web profiling and privacy, and the author's approach to addressing privacy problems with user profiling research. It provides background on trends in information technology and predictions for the future, and examines concepts like profiling, why profiling is done, and intelligence in relation to profiling.
Security and Privacy in Fog Computing for the Internet of Things using Dynami...BRNSSPublicationHubI
This document discusses security and privacy challenges in fog computing for IoT devices. It proposes using dynamic digital signatures for authentication.
Fog computing extends cloud computing by providing data, compute, storage and application services closer to IoT devices to help address issues of latency and network congestion. The proposed system uses dynamic digital signatures, which analyze characteristics of how a signature is written like speed and pressure, for authentication when IoT devices access fog nodes and the cloud. It also discusses encrypting data to help address privacy issues when data is aggregated and analyzed.
This document discusses Internet of Things (IoT) applications and networking. It covers:
1) The definition and history of IoT, how it connects devices to the internet using wireless technologies, and projections of over 20 billion connected "things" in the future.
2) Key components of an IoT system including sensing, actuation, networking, communication protocols, and machine-to-machine communications.
3) Challenges of IoT including security, scalability, energy efficiency, and data analytics.
This document discusses Internet of Things (IoT) networking. It explains that IoT involves the convergence of multiple domains like sensing, communication, cloud computing and data analytics. The key components of an IoT network are devices, communication networks and the cloud. Communication standards and gateway devices enable interconnection and information exchange between various IoT devices and the cloud. Some challenges in IoT networking include security, scalability, energy efficiency and interoperability due to the large numbers and variety of connected devices. Careful consideration is needed in choice of network architecture and communication technologies to address the diverse needs of different IoT applications.
IRJET- Rescue Robot using ESP MicrocontrollerIRJET Journal
This document describes a rescue robot designed to transmit essential information during disasters. It is equipped with sensors like a temperature sensor, humidity sensor, motion sensor, metal detector, and ultrasonic sensor. The robot can be controlled wirelessly via an Android application. It uses an ESP microcontroller to process sensor data and transmit it via an IoT network. The robot allows monitoring of conditions in hazardous areas and helps with rescue operations by identifying survivors and environmental conditions. The document discusses the system components, communication network, working, and potential applications to improve disaster management.
Women Security Assistance system with GPS tracking and messaging system Uttej Kumar Palavai
This document describes a women's security system using GPS tracking and messaging. The system uses a switch that, when pressed, sends the user's location from the GPS module to pre-stored phone numbers via GSM. The location is displayed on an LCD screen. The system is designed to help ensure women's safety and allow others to save the user if needed. It uses low-cost, widely available components like a microcontroller, GPS, GSM, and LCD for an affordable solution. The system provides location tracking and alert messaging to contacts in emergency situations to help protect women.
The document is a project report for an IoT-based smoke detection system. It describes the hardware and software components used in the system, including an MQ2 smoke sensor, Arduino Uno, GSM modem, LCD display, buzzer, relays, and ThingSpeak as the IoT platform. The system detects smoke using the sensor and sends an alert to ThingSpeak. Authorized users can then monitor the system status online. The report outlines the motivation to develop a modern alternative to traditional smoke detection that allows remote monitoring over the Internet of Things.
The document discusses user experience (UX) design considerations for Internet of Things (IoT) devices and systems. It defines UX and explains that UX for IoT is different than traditional interfaces due to specialized IoT devices bridging the digital and physical world. The document outlines principles for good IoT UX design, including simplicity, interoperability, and creating value over time. It provides examples of both good and bad IoT UX and warns that IoT should not be a strategy on its own, but used to address specific business problems.
1. The document discusses how biometrics can enhance network security by providing unique authentication through physical traits like fingerprints, iris scans, and voice patterns.
2. Biometric systems work by enrolling users through capturing traits, storing trait data, and comparing new trait inputs to what is on file for authentication.
3. Common biometric technologies discussed are fingerprints, iris scanning, handwriting analysis, voiceprints, vein patterns, which can all uniquely identify individuals for security purposes. The document argues that biometrics provide more secure authentication than passwords.
Designing for Windows Phone and other touchscreen devices - A presentation given at the recent BizSpark Camp event at Microsoft HQ in London on design and UX considerations for the upcoming Windows Phone
This document discusses how the business world is becoming increasingly mobile. It begins by outlining key trends driving this shift, such as the proliferation of mobile devices, cloud computing, and consumerization of IT. Next, it examines popular mobile devices like smartphones and tablets. Finally, it provides recommendations for how companies can develop an effective approach to managing the use of personal devices in the workplace, including segmenting employee groups and choosing appropriate security and support tools. The overall message is that businesses must adapt to the new mobile reality in order to remain competitive.
Competitor reaction
Cadbury should develop new products and promote them domestically as well as internationally. Such product/market growth approach will ensure that the company has diversified range of products which are available and well-recognizable in many countries of the world [17] . Such strategic choice will provide the company with enormous comparative advantages over its competitors and will help it to better cope with the hurdles of the global economic crisis.
Most importantly, such strategic step will erase the common stereotype claiming that consumers mostly associate Cadbury with chocolate. Evidently, ‘Chocolate is Cadbury’ marketing approach much facilitated the company’s success over the last decade. However, considering the challenges of the global competitive markets, this strategy will not be suitable any longer. Hence Cadbury should transform it into more powerful and innovative global image.
The variety of new high-quality and reasonably-priced products will add value to the business activity of Cadbury and will win new overseas markets for the company. This task would require the company to carefully design and develop innovative brands of its products which are not yet present on any of the foreign markets, and which will be potentially demanded by the consumers (i.e. target markets) [18] .
While developing innovative products and penetrating overseas markets, Cadbury should initially consider the demand-side of its target markets. Among the most important criteria are the following:
(1) Average income;
(2) Average spending amount on one-time supermarket/store purchasing;
(2) Average amount consumers are ready to spend on chocolates, candies, cookies, and/or sweets;
(3) PESTLE analysis of the target market with the consideration of the adverse affects caused by the global economic meltdown; and
(4) Porter analysis of the targeted market.
Such wide coverage of strategic issues will win Cadbury competitive advantage and increase its share on the foreign markets.
5) Preferred strategy
Cadbury’s choice of the optimal marketing strategy should consider their chances of success in terms of market diversification. To reach optimal market diversification, the company should ensure that its new product adheres to the customers’ needs and preferences. Extensive market research will help Cadbury to explicitly identify its potential target markets for a new product. Herewith, Cadbury’s marketers should consider the following strategic factors:
(1) Financial health of the targeted market;
(2) Purchasing capacity of target market;
(3) National and individual preferences of target market;
(4) Previous experiences of target market in terms of buying and tasting the similar products produced by competitor companies;
(5) SWOT analysis in each individual case will ensure that Cadbury eliminates all the possible constraints to the minimum and transforms the threats into potential opportunities.
Realistic and achievable strat
Similar to Daily Happiness Recognition from Mobile Phone Data (20)
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
National Security Agency - NSA mobile device best practices
Daily Happiness Recognition from Mobile Phone Data
1. Happiness Recognition
from Mobile Phone Data
Andrey Bogomolov1 Bruno Lepri2 Fabio Pianesi2
1University of Trento,
Via Sommarive, 5
I-38123 Povo - Trento, Italy
2Fondazione Bruno Kessler
Via Sommarive, 18
I-38050 Povo - Trento, Italy
EmoPAR group meeting 2013-JUN-19, Trento, Italy.
1 / 49
8. Happiness Data
Descriptive Statistics
number of records 12991
mean 4.84
standard deviation 1.26
median 5.00
mean average deviation 1.48
min 1.00
max 7.00
range 6.00
skew -0.39
kurtosis -0.07
8 / 49
9. Happiness Data
Within-person and between-subject variance
0 1 2 3 4 5 6
0.00.20.40.60.81.01.21.4
density.default(x = r1[, 1])
Variance
Density
Within−Person Variance
Between−Person Variance
9 / 49
11. Feature Space
Basic Features: General Phone Usage
1. Total Number of Calls (Outgoing+Incoming)
2. Total Number of Incoming Calls
3. Total Number of Outgoing Calls
4. Total Number of Missed Calls
5. Number of SMS received
6. Number of SMS sent
11 / 49
12. Feature Space
Basic Features: Diversity
7. Number of Unique Contacts Called
8. Number of Unique Contacts who Called
9. Number of Unique Contacts Communicated with (Incoming+Outgoing)
10. Number of Unique Contacts Associated with Missed Calls
11. Entropy of Call Contacts
12. Call Contacts to Interactions Ratio
13. Number of Unique Contacts SMS received from
14. Number of Unique Contacts SMS sent to
15. Entropy of SMS Contacts
16. Sms Contacts to Interactions Ratio
12 / 49
13. Feature Space
Basic Features: Active Behaviors
17. Percent Call During the Night
18. Percent Call Initiated
19. Sms response rate
20. Sms response latency
21. Percent SMS Initiated
13 / 49
14. Feature Space
Basic Features: Regularity
22. Average Inter-event Time for Calls (time elapsed between two events)
23. Average Inter-event Time for SMS (time elapsed between two events)
24. Variance Inter-event Time for Calls (time elapsed between two events)
25. Variance Inter-event Time for SMS (time elapsed between two events)
14 / 49
15. Feature Space
Proximity Features
General Bluetooth Proximity
1. Number of Bluetooth IDs
2. Times most common Bluetooth ID is seen
3. Bluetooth IDs accounting for n% of IDs seen
4. Bluetooth IDs seen for more than k time slots
5. Time interval for which a Bluetooth ID is seen
6. Entropy of Bluetooth contacts
Diversity
7. Contacts to interactions ratio
Regularity
8. Average Bluetooth interactions inter-event time
(time elapsed between two events)
9. Variance of the Bluetooth interactions inter-event time
(time elapsed between two events)
15 / 49
16. Feature Space Innovation
“Background Noise” Features
a) peoples activity, as detected through their smartphones
b) the weather conditions {humidity, wind speed, pressure,
total precipitation and visibility}
c) personality traits {“Big Five"}
Functional Innovation
a) time domain – sliding window functions
b) Miller-Madow correction for entropy calculation
ˆHMM(θ) ≡ −
p
i=1
θML,i log θML,i +
ˆm − 1
2N
16 / 49
19. Results
Final Classifier Performance Metrics Comparison
Training set Test set
Accuracy 0.8081 0.8036
Kappa 0.5879 0.5743
AccuracyLower 0.8004 0.7878
AccuracyUpper 0.8156 0.8187
AccuracyNull 0.6415 0.6419
AccuracyPValue 2.139e-303 8.826e-73
McnemarPValue 5.647e-208 1.738e-57
19 / 49
20. Results
Final Classifier Confusion Matrix for Training Set
-1 0 1
-1 782 119 75
0 153 1170 145
1 600 903 6448
Final Classifier Confusion Matrix for Test Set
-1 0 1
-1 197 30 14
0 34 274 37
1 152 243 1616
20 / 49
21. Results
What We Learnt: Final Model ROC curve
Specificity
Sensitivity
0.00.20.40.60.81.0
1.0 0.8 0.6 0.4 0.2 0.0
AUC: 0.844
21 / 49
22. Limitations
Data
Data loss not registered as NA’s
Battery
Temporal resolution
Model
Requires personality data
Requires 1 week data collection period
Not tested on diverse cultural groups
22 / 49
23. Summary
Automatic recognition of people’s daily happiness from
mobile phone data is feasible.
Accuracy is approaching the results of multi-modal
obtrusive methods.
Future work should be focused on multi-step recognition
model development.
23 / 49
25. References I
Aharony, Nadav, Wei Pan, Cory Ip, Inas Khayal, and
Alex Pentland (2011). “Social fMRI: Investigating and shaping
social mechanisms in the real world”. In: Pervasive and Mobile
Computing 7.6, pp. 643–659.
Anguita, Davide, Alessandro Ghio, Luca Oneto, Xavier Parra,
and Jorge L. Reyes-Ortiz (2012). “Human Activity Recognition
on Smartphones Using a Multiclass Hardware-Friendly Support
Vector Machine”. In: IWAAL, pp. 216–223.
Bickmore, Timothy W., Rosalind, and W. Picard (2005).
“Establishing and Maintaining Long-Term Human-Computer
Relationships”. In: ACM Transactions on Computer Human
Interaction 12, pp. 293–327.
Bishop, C. M. (1995). “Training with Noise is Equivalent to
Tikhonov Regularization”. In: Neural Computation 7.1,
pp. 108–116.
25 / 49
26. References II
Both, Fiemke, Mark Hoogendoorn, Michel C. A. Klein, and
Jan Treur (2010). “Computational modeling and analysis of the
role of physical activity in mood regulation and depression”. In:
Proceedings of the 17th international conference on Neural
information processing: theory and algorithms - Volume Part I.
ICONIP’10. Sydney, Australia: Springer-Verlag, pp. 270–281.
Brave, Scott and Clifford Nass (2003). “The human-computer
interaction handbook”. In: ed. by Julie A. Jacko and
Andrew Sears. Hillsdale, NJ, USA: L. Erlbaum Associates Inc.
Chap. Emotion in human-computer interaction, pp. 81–96.
Breiman, Leo (Oct. 2001). “Random Forests”. In: Mach. Learn.
45.1, pp. 5–32.
Broek, Egon L. (Jan. 2013). “Ubiquitous emotion-aware
computing”. In: Personal Ubiquitous Comput. 17.1, pp. 53–67.
Buhmann, Martin D. and M. D. Buhmann (2003). Radial Basis
Functions. New York, NY, USA: Cambridge University Press.
26 / 49
27. References III
Busso, Carlos, Zhigang Deng, Serdar Yildirim, Murtaza Bulut,
Chul Min Lee, Abe Kazemzadeh, Sungbok Lee,
Ulrich Neumann, and Shrikanth Narayanan (2004). “Analysis of
emotion recognition using facial expressions, speech and
multimodal information”. In: in Sixth International Conference
on Multimodal Interfaces ICMI 2004. ACM Press, pp. 205–211.
Campbell, Angus, Philip E. Converse, and Willard L Rodgers
(1976). The quality of American life : perceptions, evaluations,
and satisfactions / Angus Campbell, Philip E. Converse, Willard
L. Rodgers. English. Russell Sage Foundation New York, xi,
583 p. :
Carlson, Charles R., Frank P. Gantz, and John C. Masters
(1983). “Adults’ emotional states and recognition of emotion in
young children”. English. In: Motivation and Emotion 7.1,
pp. 81–101.
27 / 49
28. References IV
Carver, Charles S. and Michael F. Scheier (Jan. 1990). “Origins
and Functions of Positive and Negative Affect: A
Control-Process View”. In: Psychological Review 97.1,
pp. 19–35.
Chittaranjan, Gokul, Jan Blom, and Daniel Gatica-Perez (Mar.
2013). “Mining large-scale smartphone data for personality
studies”. In: Personal Ubiquitous Comput. 17.3, pp. 433–450.
Cohen, Jacob (Apr. 1960). “A Coefficient of Agreement for
Nominal Scales”. In: Educational and Psychological
Measurement 20.1, pp. 37–46.
Cohn, Jeffrey F. (2007). “Foundations of human computing:
facial expression and emotion”. In: Proceedings of the ICMI
2006 and IJCAI 2007 international conference on Artifical
intelligence for human computing. ICMI’06/IJCAI’07. Banff,
Canada: Springer-Verlag, pp. 1–16.
28 / 49
29. References V
Costa, P T and R R McCrae (1992). Revised NEO personality
inventory (NEO PI-R) and neo five-factor inventory (NEO-FFI).
Vol. 0. October. Psychological Assessment Resources,
pp. 17–20.
— (1995). “Domains and facets: hierarchical personality
assessment using the revised NEO personality inventory.” In:
Journal of Personality Assessment 64.1, pp. 21–50.
Costa, Paul T. and Robert R. McCrae (1980). “Influence of
extraversion and neuroticism on subjective well-being: Happy
and unhappy people”. In: Journal of Personality and Social
Psychology 38 (4), pp. 668–678.
Cowie, R., E. Douglas-Cowie, K. Karpouzis, G. Caridakis,
M. Wallace, and S. Kollias (2008). “Recognition of Emotional
States in Natural Human-Computer Interaction”. English. In:
Multimodal User Interfaces. Ed. by Dimitrios Tzovaras. Signals
and Commmunication Technologies. Springer Berlin
Heidelberg, pp. 119–153.
29 / 49
30. References VI
Cowie, Roddy, Ellen Douglas-Cowie, Nicolas Tsapatsoulis,
George Votsis, Stefanos Kollias, Winfried Fellenz, and
John G Taylor (2001). “Emotion recognition in human-computer
interaction”. In: Signal Processing Magazine, IEEE 18.1,
pp. 32–80.
DeNeve, K.M. and H. Cooper (1998). “The happy personality: a
meta-analysis of 137 personality traits and subjective
well-being.” In: Psychol Bull 124.2, pp. 197–229.
Denissen, Jaap J. A., Ligaya Butalid, Lars Penke, and Marcel
A. G. Van Aken (2008). “The effects of weather on daily mood:
A multilevel approach.” In: Emotion Researcher 8.5,
pp. 662–667.
Diener, Ed (1994). “Assessing subjective well-being: Progress
and opportunities”. English. In: Social Indicators Research
31.2, pp. 103–157.
Diener, Ed and Martin E.P. Seligman (2002). “Very Happy
People”. In: Psychological Science 13.1, pp. 81–84.
30 / 49
31. References VII
Dolan, R. J. (Nov. 2002). “Emotion, cognition, and behavior.”
In: Science (New York, N.Y.) 298.5596.
Dong, Wen, Bruno Lepri, and Alex Pentland (2011). “Modeling
the co-evolution of behaviors and social relationships using
mobile phone data”. In: MUM, pp. 134–143.
Eagle, Nathan and Alex Pentland (2006). “Reality mining:
sensing complex social systems”. In: Personal and Ubiquitous
Computing 10.4, pp. 255–268.
Eagle, Nathan, Alex (Sandy) Pentland, and David Lazer (2009).
“Inferring friendship network structure by using mobile phone
data”. In: Proceedings of the National Academy of Sciences
106.36, pp. 15274–15278.
Feldman, Lisa A (1995). “Valence focus and arousal focus:
Individual differences in the structure of affective experience”.
In: Journal of personality and social psychology 69,
pp. 153–153.
31 / 49
32. References VIII
FUNF Open Sensing Framework. (Access date: 12-JUN-2013).
http://www.funf.org.
Garcia, Salvador and Francisco Herrera (Dec. 2008). “An
Extension on "Statistical Comparisons of Classifiers over
Multiple Data Sets" for all Pairwise Comparisons”. In: Journal
of Machine Learning Research 9, pp. 2677–2694.
Gray, J. A. (1991). “Neural systems, emotion, and personality.”
English. In: Neurobiology of learning, emotion, and affect /
editor, John Madden IV. Raven Press New York, pp. 273–306.
Greenberg, Ariel M., William G. Kennedy, and Nathan Bos,
eds. (2013). Social Computing, Behavioral-Cultural Modeling
and Prediction - 6th International Conference, SBP 2013,
Washington, DC, USA, April 2-5, 2013. Proceedings.
Vol. 7812. Lecture Notes in Computer Science. Springer.
Gunes, H. and M. Pantic (2010). “Automatic, Dimensional and
Continuous Emotion Recognition”. In: Int’l Journal of Synthetic
Emotion 1.1, pp. 68–99.
32 / 49
33. References IX
Gunes, H., B. Schuller, M. Pantic, and R. Cowie (2011).
“Emotion Representation, Analysis and Synthesis in
Continuous Space: A Survey”. In: Proceedings of IEEE
International Conference on Automatic Face and Gesture
Recognition (FG’11), EmoSPACE 2011 - 1st International
Workshop on Emotion Synthesis, rePresentation, and Analysis
in Continuous spacE. Santa Barbara, CA, USA, pp. 827–834.
Hand, DavidJ. and RobertJ. Till (2001). “A Simple
Generalisation of the Area Under the ROC Curve for Multiple
Class Classification Problems”. English. In: Machine Learning
45 (2), pp. 171–186.
Hernandez, Javier, Mohammed E. Hoque, and
Rosalind W. Picard (2012). “Mood Meter: large-scale and
long-term smile monitoring system”. In: ACM SIGGRAPH 2012
Emerging Technologies. SIGGRAPH ’12. Los Angeles,
California: ACM, 15:1–15:1.
33 / 49
34. References X
John, Oliver P. and Sanjay Srivastava (1999). “The Big Five trait
taxonomy: History, measurement, and theoretical
perspectives”. In: Handbook of Personality: Theory and
Research. Ed. by Lawrence A. Pervin and Oliver P. John.
Second. New York: Guilford Press, pp. 102–138.
Kapoor, Ashish, Winslow Burleson, and Rosalind W. Picard
(Aug. 2007). “Automatic prediction of frustration”. In: Int. J.
Hum.-Comput. Stud. 65.8, pp. 724–736.
Kapoor, Ashish and Rosalind W. Picard (2005). “Multimodal
affect recognition in learning environments”. In: Proceedings of
the 13th annual ACM international conference on Multimedia.
MULTIMEDIA ’05. Hilton, Singapore: ACM, pp. 677–682.
Keller, Matthew C., Barbara L. Fredrickson, Oscar Ybarra,
Stephane Cote, Kareem Johnson, Joe Mikels, Anne Conway,
and Tor Wager (Sept. 2005). “A Warm Heart and a Clear Head:
The Contingent Effects of Weather on Mood and Cognition”.
In: Psychological Science 16.9, pp. 724–731.
34 / 49
35. References XI
Krzanowski, Wojtek J. (2005). “Misclassification Rates”. In:
Encyclopedia of Statistics in Behavioral Science.
Lane, Nicholas, Mashfiqui Mohammod, Mu Lin, Xiaochao Yang,
Hong Lu, Shahid Ali, Afsaneh Doryab, Ethan Berke,
Tanzeem Choudhury, and Andrew Campbell (Apr. 2012).
“BeWell: A Smartphone Application to Monitor, Model and
Promote Wellbeing”. In: IEEE.
Lane, Nicholas D., Emiliano Miluzzo, Hong Lu, Daniel Peebles,
Tanzeem Choudhury, and Andrew T. Campbell (Sept. 2010). “A
survey of mobile phone sensing”. In: Comm. Mag. 48.9,
pp. 140–150.
Lee, Gary R. and Masako Ishii-Kuntz (Dec. 1987). “Social
Interaction, Loneliness, and Emotional Well-Being among the
Elderly”. In: Research on Aging 9.4, pp. 459–482.
35 / 49
36. References XII
Lester, Jonathan, Tanzeem Choudhury, and Gaetano Borriello
(2006). “A Practical Approach to Recognizing Physical
Activities”. In: Pervasive Computing. Ed. by KennethP. Fishkin,
Bernt Schiele, Paddy Nixon, and Aaron Quigley. Vol. 3968.
Lecture Notes in Computer Science. Springer Berlin
Heidelberg, pp. 1–16.
LEWIS, M.E. and J.M.E. HAVILAND-JONES (2004). Handbook
of Emotions. Guilford Publications, Incorporated.
Lin, Wei-Jiun and James J. Chen (Jan. 2013).
“Class-imbalanced classifiers for high-dimensional data”. In:
Briefings in Bioinformatics 14.1, pp. 13–26.
Lyubomirsky, Sonja, Laura King, and Ed Diener (Nov. 2005).
“The Benefits of Frequent Positive Affect: Does Happiness Lead
to Success?” In: Psychological Bulletin 131.6, pp. 803–855.
36 / 49
37. References XIII
Lyubomirsky, Sonja, Chris Tkach, and Robin M. Dimatteo
(2006). “WHAT ARE THE DIFFERENCES BETWEEN
HAPPINESS AND SELF-ESTEEM?” In: Social Indicators
Research 78, pp. 363–404.
Ma, Yuanchao, Bin Xu, Yin Bai, Guodong Sun, and Run Zhu
(2012). “Daily Mood Assessment Based on Mobile Phone
Sensing”. In: Wearable and Implantable Body Sensor Networks
(BSN), 2012 Ninth International Conference on, pp. 142–147.
Madan, Anmol, Manuel Cebrián, David Lazer, and
Alex Pentland (2010). “Social sensing for epidemiological
behavior change”. In: UbiComp, pp. 291–300.
McCrae, Robert R. and Paul T. Costa (1991). “Adding Liebe
und Arbeit: The Full Five-Factor Model and Well-Being”. In:
Personality and Social Psychology Bulletin 17.2, pp. 227–232.
Miller, G. (1955). “Note on the bias of information estimates”.
In: Information theory in psychology: Problems and methods
2.95, p. 100.
37 / 49
38. References XIV
Miller, Geoffrey (2012). “The Smartphone Psychology
Manifesto”. In: Perspectives on Psychological Science 7.3,
pp. 221–237.
Montjoye, Yves-Alexandre, Jordi Quoidbach, Florent Robic, and
Alex(Sandy) Pentland (2013a). “Predicting Personality Using
Novel Mobile Phone-Based Metrics”. In: Social Computing,
Behavioral-Cultural Modeling and Prediction. Ed. by
ArielM. Greenberg, WilliamG. Kennedy, and NathanD. Bos.
Vol. 7812. Lecture Notes in Computer Science. Springer Berlin
Heidelberg, pp. 48–55.
Montjoye, Yves-Alexandre de, Jordi Quoidbach, Florent Robic,
and Alex Pentland (2013b). “Predicting Personality Using Novel
Mobile Phone-Based Metrics”. In: SBP. Ed. by
Ariel M. Greenberg, William G. Kennedy, and Nathan Bos.
Vol. 7812. Lecture Notes in Computer Science. Springer,
pp. 48–55.
38 / 49
39. References XV
Moturu, Sai T., Inas Khayal, Nadav Aharony, Wei Pan, and
Alex Pentland (2011). “Using Social Sensing to Understand the
Links between Sleep, Mood, and Sociability”. In:
SocialCom/PASSAT, pp. 208–214.
Muaremi, Amir, Bert Arnrich, and Gerhard Tröster (2012). “A
Survey on Measuring Happiness with Smart Phones”. In:
Myers, David G. and Ed Diener (1995). “Who Is Happy?” In:
Psychological Science 6.1, pp. 10–19.
Myers, I.B. and P.B. Myers (1980). Gifts differing: understanding
personality type. Davies-Black Pub.
Nicolaou, M. A., H. Gunes, and M. Pantic (2011).
“Output-Associative RVM Regression for Dimensional and
Continuous Emotion Prediction”. In: Proceedings of IEEE
International Conference on Automatic Face and Gesture
Recognition (FG’11). Santa Barbara, CA, USA, pp. 16–23.
Nicu Sebe Erwin Bakker, Ira Cohen Theo Gevers and
Thomas Huang. Bimodal Emotion Recognition.
39 / 49
40. References XVI
Oikonomopoulos, A., I. Patras, M. Pantic, and N. Paragios
(2007). “Trajectory-based Representation of Human Actions”.
In: Lecture Notes in Artificial Intelligence, Special Volume on
Artificial Intelligence for Human Computing. Ed. by T. Huang,
A. Nijholt, A. Pentland, and M. Pantic. Vol. 4451, pp. 133–154.
Paninski, Liam (June 2003). “Estimation of entropy and mutual
information”. In: Neural Comput. 15.6, pp. 1191–1253.
Pantic, M. (2005). “Affective Computing”. In: in The
Encyclopedia of Multimedia Technology and Networking, M.
Pagani, Ed. Hershy, USA: Idea Group Reference. Vol. 1,
pp. 8–14.
— (2009a). “Affective Computing (revisited)”. In: in The
Encyclopedia of Multimedia Technology and Networking - 2nd
Edition, M. Pagani, Ed., Hershy, USA: Idea Group Reference.
Vol. 1, pp. 15–21.
40 / 49
41. References XVII
Pantic, M. (2009b). “Machine analysis of facial behaviour:
Naturalistic and dynamic behaviour”. In: Philosophical
Transactions of Royal Society B 364, pp. 3505–3513.
Pantic, M., A. Pentland, A. Nijholt, and T. Huang (2007).
“Human Computing and Machine Understanding of Human
Behavior: A Survey”. In: Lecture Notes in Artificial Intelligence,
Special Volume on Artificial Intelligence for Human Computing.
Ed. by T. Huang, A. Nijholt, A. Pentland, and M. Pantic.
Vol. 4451, pp. 47–71.
Pantic, M., R. Cowie, F. D’ericco, D. Heylen, M. Mehu,
C. Pelachaud, I. Poggi, M. Schroder, and A. Vinciarelli (2011).
“Social Signal Processing: The Research Agenda”. In: Visual
Analysis of Humans, pp. 511–538.
Pentland, Alex and Andrew Liu (Jan. 1999). “Modeling and
prediction of human behavior”. In: Neural Comput. 11.1,
pp. 229–242.
41 / 49
42. References XVIII
Picard, Rosalind W. (1997). Affective computing. Cambridge,
MA, USA: MIT Press.
Quercia, Daniele (2013). Donât Worry, Be Happy: The
Geography of Happiness on Facebook. http://profzero.
org/publications/websci13_dontworry.pdf.
Quercia, Daniele, Jonathan Ellis, Licia Capra, and
Jon Crowcroft (2012). “Tracking "gross community happiness"
from tweets”. In: CSCW, pp. 965–968.
Rabbi, Mashfiqui, Shahid Ali, Tanzeem Choudhury, and
Ethan Berke (2011). “Passive and In-Situ assessment of mental
and physical well-being using mobile sensors”. In: Proceedings
of the 13th international conference on Ubiquitous computing.
UbiComp ’11. Beijing, China: ACM, pp. 385–394.
42 / 49
43. References XIX
Rachuri, Kiran K., Mirco Musolesi, Cecilia Mascolo,
Peter J. Rentfrow, Chris Longworth, and Andrius Aucinas
(2010). “EmotionSense: a mobile phones based adaptive
platform for experimental social psychology research”. In:
UbiComp, pp. 281–290.
Robert LiKamWa Yunxin Liu, Nicholas D. Lane Lin Zhong
(2013). MoodScope: Building a Mood Sensor from Smartphone
Usage Patterns.
http://niclane.org/pubs/mobisys_moodscope.pdf.
Salah, Albert Ali and Bruno Lepri (2011). “Challenges of
Human Behavior Understanding for Inducing Behavioral
Change”. In: AmI Workshops, pp. 249–251.
43 / 49
44. References XX
Salah, AlbertAli, Javier Ruiz-del Solar, Ãetin Meriçli, and
Pierre-Yves Oudeyer (2012). “Human Behavior Understanding
for Robotics”. In: Human Behavior Understanding. Ed. by
AlbertAli Salah, Javier Ruiz-del Solar, Ãetin Meriçli, and
Pierre-Yves Oudeyer. Vol. 7559. Lecture Notes in Computer
Science. Springer Berlin Heidelberg, pp. 1–16.
Sanderson C.A., Cantor N. (1999). “A life task perspective on
personality coherence: Stability versus change in tasks, goals,
strategies, and outcomes.” In: D. Cervone & Y. Shoda (Eds.),
The Coherence of Personality: Social-cognitive Bases of
Consistency, Variability, and Organization. New York, NY, USA:
Guilford Press, pp. 372–392.
Schuller, B., R.J. Villar, G. Rigoll, and M. Lang (2005).
“Meta-Classifiers in Acoustic and Linguistic Feature
Fusion-Based Affect Recognition”. In: Acoustics, Speech, and
Signal Processing, 2005. Proceedings. (ICASSP ’05). IEEE
International Conference on. Vol. 1, pp. 325–328.
44 / 49
45. References XXI
Sebe, Nicu, Michael S. Lew, Ira Cohen, Ashutosh Garg, and
Thomas S. Huang (2002). “Emotion Recognition Using a
Cauchy Naive Bayes Classifier”. In: in Proc. ICPR, pp. 17–20.
Soleymani, M. and M. Pantic (2013). “Emotionally Aware TV”.
In: Proceedings of TVUX-2013: Workshop on Exploring and
Enhancing the User Experience for TV at ACM CHI 2013.
Paris, France.
Soleymani, M., M. Pantic, and T. Pun (2012). “Multimodal
Emotion Recognition in Response to Videos”. In: IEEE Trans.
on Affective Computing 3.2. in press, pp. 211–223.
Staiano, Jacopo, Bruno Lepri, Ramanathan Subramanian,
Nicu Sebe, and Fabio Pianesi (2011). “Automatic modeling of
personality states in small group interactions”. In: Proceedings
of the 19th ACM international conference on Multimedia. MM
’11. Scottsdale, Arizona, USA: ACM, pp. 989–992.
45 / 49
46. References XXII
Staiano, Jacopo, Bruno Lepri, Nadav Aharony, Fabio Pianesi,
Nicu Sebe, and Alex Pentland (2012). “Friends don’t lie:
inferring personality traits from social network structure”. In:
Proceedings of the 2012 ACM Conference on Ubiquitous
Computing. ACM, pp. 321–330.
Stehman, Stephen V. (1997). “Selecting and interpreting
measures of thematic classification accuracy”. In: Remote
Sensing of Environment 62.1, pp. 77–89.
Track your Happiness Web Application. (Access date:
12-JUN-2013). http://www.trackyourhappiness.org.
Tsutsui, Yoshiro (2012). “Weather and Individual Happiness”.
In: Weather, Climate, and Society 5.1, pp. 70–82.
Unser, Michael (2000). “Sampling–50 years after Shannon”. In:
Proceedings of the IEEE, pp. 569–587.
Vapnik, Vladimir N. (1995). The nature of statistical learning
theory. New York, NY, USA: Springer-Verlag New York, Inc.
46 / 49
47. References XXIII
Vitters, Joar (2001). “Personality traits and subjective
well-being: emotional stability, not extraversion, is probably the
important predictor”. In: Personality and Individual Differences
31.6, pp. 903 –914.
Wagner, Johannes, Florian Lingenfelser, Elisabeth Andre,
Jonghwa Kim, and Thurid Vogt (2011a). “Exploring Fusion
Methods for Multimodal Emotion Recognition with Missing
Data”. In: IEEE Transactions on Affective Computing 2.4,
pp. 206–218.
Wagner, Johannes, Elisabeth Andre, Florian Lingenfelser, and
Jonghwa Kim (Oct. 2011b). “Exploring Fusion Methods for
Multimodal Emotion Recognition with Missing Data”. In: IEEE
Trans. Affect. Comput. 2.4, pp. 206–218.
Wandishin, Matthew S. and Steven J. Mullen (2009). Multiclass
ROC Analysis. American Meteorological Society.
47 / 49
48. References XXIV
Wang, Yongjin and Ling Guan (2008). “Recognizing Human
Emotional State From Audiovisual Signals”. In: Multimedia,
IEEE Transactions on 10.4, pp. 659–668.
Zajonc, Robert B and Daniel N McIntosh (1992). “Emotions
research: Some promising questions and some questionable
promises”. In: Psychological Science, pp. 70–74.
Zeng, Z., M. Pantic, and T. Huang (2009). “Emotion Recognition
based on Multimodal Information”. In: Affective Information
Processing. Ed. by T. Tan and J. Tao. Springer, pp. 241–266.
Zeng, Z., M. Pantic, G. Roisman, and T. Huang (2009). “A
Survey of Affect Recognition Methods: Audio, Visual, and
Spontaneous Expressions”. In: IEEE Transactions on Pattern
Analysis and Machine Intelligence 31.1, pp. 39–58.
48 / 49
49. References XXV
Zeng, Zhihong, Jilin Tu, Ming Liu, Tong Zhang,
Nicholas Rizzolo, Zhenqiu Zhang, Thomas S. Huang,
Dan Roth, and Stephen Levinson (2004). “Bimodal HCI-related
affect recognition”. In: Proceedings of the 6th international
conference on Multimodal interfaces, pp. 137–143.
49 / 49