ALICE TURCHANINOVA UNIVERSITY OF HOUSTON-DOWNTOWN PROF. IOANNIS PAVLIDIS Analyzing Human Activity Patterns via Mobile App.

Slides:



Advertisements
Similar presentations
Detection of Deviant Behavior From Agent Traces Boštjan Kaluža Department of Intelligent Systems, Jožef Stefan Institute Jozef Stefan Institute Jožef Stefan.
Advertisements

Activity Diagrams [Arlow and Neustadt, 2005] CS 425 / 625 Seminar on Software Engineering University of Nevada, Reno Department of Computer Science & Engineering.
PARTICIPATORY MEDICINE: LEVERAGING SOCIAL NETWORKS IN TELEHEALTH SOLUTIONS Duckki Lee, PhD Stduent Mobile and Pervasive Computing Lab University of Florida.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Traffic Engineering With Traditional IP Routing Protocols
ABSTRACT The goal of this project was to develop a self-help Android application to aid pregnant women in achieving healthy weight gain during pregnancy.
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
DIDS part II The Return of dIDS 2/12 CIS GrIDS Graph based intrusion detection system for large networks. Analyzes network activity on networks.
Midterm Presentation Undergraduate Researchers: Graduate Student Mentor: Faculty Mentor: Jordan Cowart, Katie Allmeroth Krist Culmer Dr. Wenjun (Kevin)
Overview E2E Soccer have released a mobile app for the Apple iPhone for coaches and players who use E2E Soccer’s League Centre product. The mobile app.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Digital Texts and the Future of Education: Why Books? A Critique of Mayrath, M., Priya, N., & Perkins, C. (2011). Digital Texts and the Future of Education:
Analysis and Modeling of the Open Source Software Community Yongqin Gao, Greg Madey Computer Science & Engineering University of Notre Dame Vincent Freeh.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
On Anomalous Hot Spot Discovery in Graph Streams
Detecting Node encounters through WiFi By: Karim Keramat Jahromi Supervisor: Prof Adriano Moreira Co-Supervisor: Prof Filipe Meneses Oct 2013.
Research Meeting Seungseok Kang Center for E-Business Technology Seoul National University Seoul, Korea.
Patterns And A Generative Model Jan 24, 2014 Authors: Jianwei Niu, Wanjiun Liao, Jing Peng, Chao Tong Presenter: Guoming Wang Published: Performance Computing.
The Evolution of Video Game Development Research by Jariel Ortiz, Academia Bautista de Puerto Nuevo, San Juan, Puerto Rico Research Mentor: Prof. Irma.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
MiLAN: Middleware to Support Sensor Network Applications Jonghak Kim, Da Huo, Hyungik Oh.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
LOGO The Development of Collaborative Project–Based Learning Via Augmented Reality m-Learning for Thai and The Lao People’s Democratic Republic Students.
All that remains is to connect the edges in the variable-setters to the appropriate clause-checkers in the way that we require. This is done by the convey.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Computer Science Wi-Fi App using J2ME and MVC Architecture Advisor : Dr. Chung-E Wang Department of Computer Science Sacramento State University Date:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Distributed Mobility Management using IEEE Date Submitted: March 16, 2011.
Find regular encounter pattern from mobile users. Regular encounter indicates an encounter trend that is repetitive and consistent. Using this metric can.
Ilyas Uyanik 1, Panagiotis Tsiamyrtzis 3, Daniel Price 2, Ioannis Pavlidis 1 1 Computational Physiology Laboratory, University of Houston, 2 Honors College,
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
A Graph-based Friend Recommendation System Using Genetic Algorithm
Topology and Evolution of the Open Source Software Community Advisors: Dr. Vincent W. Freeh Dr. Kevin Bowyer Supported in part by the National Science.
Use of Public Health Intelligence for Disease Outbreaks (PHIDO) to Enhance Provincial Routine Reportable Disease Surveillance in Manitoba Weimin Hu, MBBS.
Selfishness, Altruism and Message Spreading in Mobile Social Networks September 2012 In-Seok Kang
ACM International Conference on Information and Knowledge Management (CIKM) Analysis of Physical Activity Propagation in a Health Social Network.
Query Suggestion Naama Kraus Slides are based on the papers: Baeza-Yates, Hurtado, Mendoza, Improving search engines by query clustering Boldi, Bonchi,
EVENT DETECTION IN TIME SERIES OF MOBILE COMMUNICATION GRAPHS
Page 1 Inferring Relevant Social Networks from Interpersonal Communication Munmun De Choudhury, Winter Mason, Jake Hofman and Duncan Watts WWW ’10 Summarized.
Sussex County Child Health Promotion Collaborative March 15, 2006.
Howto use Eureka ICS 105 Research Team Fall 2000.
Integrated business-information system for sales process support Bitrix24 Marta Alić, prof. University of Applied Sciences, Zagreb.
Computer New Student Orientation. Overview Our degree programs Jobs in the Computing Field Student Projects Faculty Research.
Date: 2012/08/21 Source: Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong Li Lee (KEYS’12) Speaker: Er-Gang Liu Advisor: Dr. Jia-ling Koh 1.
KNN CF: A Temporal Social Network kNN CF: A Temporal Social Network Neal Lathia, Stephen Hailes, Licia Capra University College London RecSys ’ 08 Advisor:
10 Tips for Creating Winning Mobile App Marketing Campaigns.
Networks are connections and interactions. Networks are present in every aspect of life. Examples include economics/social/political sciences. Networks.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Network-Initiated Handover Procedure Update Date Submitted: October.
MYNICU BABY PURPLE Volodymyr Budnichenko, Zhi Zhang Mentors: Dr.Pargas, Dr. Nancy Meehan.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
2013 IEEE 14th International Conference on Mobile Data Management Authors: 1. Jiansu Pu 2. Siyuan Liu 3. Ye Ding 4. Huamin Qu 5. Lionel Ni By: Farah Kamw.
July 2011doc.: IEEE psc SubmissionPaul Jeon, LG Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
SIP6 Platform Updates Based on CNGI-CERNET2 Network Research Center Tsinghua University.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Dynamic Network Analysis Case study of PageRank-based Rewiring Narjès Bellamine-BenSaoud Galen Wilkerson 2 nd Second Annual French Complex Systems Summer.
Chapter 7: Introduction to Data Communications and Networking
Replication Middleware for Cloud Based Storage Service
Order Pairs An introduction.
Sel in ymca afterschool project results
Handful of Happiness Overview Problem Solution Design Iteration
Bidirectional Query Planning Algorithm
Brian On Professor Skubic Alice Wong Mentor: Moein Enayati
Analyzing Two Participation Strategies in an Undergraduate Course Community Francisco Gutierrez Gustavo Zurita
Resource Allocation for Distributed Streaming Applications
TECHNICAL PAPER PRESENTATION By: Srihitha Yerabaka
Analyzing social media data to monitor public health trends
“The Spread of Physical Activity Through Social Networks”
OUR APPROACH TO MONETIZATION
Presentation transcript:

ALICE TURCHANINOVA UNIVERSITY OF HOUSTON-DOWNTOWN PROF. IOANNIS PAVLIDIS Analyzing Human Activity Patterns via Mobile App

Introduction 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements iBurnCalorie: health and fitness app released by CPL. Current goal: carry out observational study of users in iBurnCalorie social network. Ultimate goal: offer users optimal pairing with other users to motivate physical activity. Method: analyze human walking and driving patterns and social network behavior with iBurnCalorie. 2

iBurnCalorie 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements Allows users to keep track of their daily walking, biking, and driving activity. Includes a social networking component: users choose “buddies” to follow and compete against. 3

Persistency categories 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements Users are divided into low, medium, and high persistency categories based on the number of days they have consistently used the application. Low persistency: 5 or less Medium persistency: more than 5, less than 10 High persistency: 10 or more 4

Walking patterns 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 5

Driving patterns 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 6

Gephi 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 7

Graph components 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements Nodes in the graph represent users in the iBurnCalorie social network. Edges between nodes represent connections between users. Curved edges should be read clockwise from source to target. 8

Graph attributes 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 9 Normal Overweight Obese Statistical user

Graph of all users 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 10

Graph of low persistency users 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 11

Graph of high persistency users 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 12

Evolution of the network 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements 13

Interventional networking 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements Track user performance as they follow others. Suggest optimal pairing for users. Better connections, better motivation! 14

Further work 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements Analyze new, larger set of social network data. Write full paper to submit to CHI 2015 (leading conference in Human-Computer Interaction). Write abstract to present at SACNAS conference. 15

Acknowledgements 2 Overview 4 Activity Analysis 7 Network analysis 14 Goals 16 Acknowledgements Prof. Ioannis Pavlidis, advisor Ilyas Uyanik, mentor (research assistant, Ph.D. student) 16

Questions? Thank you! 17