TV Program Recommender using User Authentication on Middleware Ginga

被引:0
|
作者
Crespo, Jorge [1 ]
Tello, Andres [2 ]
Saquicela, Victor [2 ]
Palacio-Baus, Kenneth [2 ]
Espinoza, Mauricio [2 ]
机构
[1] Univ Cuenca, Sch Syst Engn, Cuenca, Ecuador
[2] Univ Cuenca, Dept Comp Sci, Cuenca, Ecuador
关键词
user authentication; recommender system; digital TV;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The system proposed in this article aims to identify and recognize television users with the objective of offering personalized television programming. In this setting, the authentication and recommendation mechanisms used require to collect the necessary information in an implicit manner as much as possible, such that the leisure and entertainment objectives this broadcasting medium brings are not interrupted. The design proposed for the implementation of the interactive application uses an authentication process based on facial recognition and a recommendation algorithm based on contextual information, which is mainly implicitly captured. Experimental obtained results show that the system offers more accurate recommendations when the user exhibits a habitual behavior; e.g. watching TV programs of a same category in a specific channel and schedule.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Using the Context of User Feedback in Recommender Systems
    Peska, Ladislav
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (233): : 1 - 12
  • [22] Continuous User Authentication using WiFi
    Huang, Pengcheng
    Zhang, Dongheng
    Geng, Ruixu
    Chen, Yan
    [J]. PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 2083 - 2088
  • [23] User Authentication Using Keystroke Recognition
    Garg, Urvashi
    Meena, Yogesh Kumar
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, 2013, 174 : 131 - 136
  • [24] Using Mobile Devices for User Authentication
    Lach, Jacek
    [J]. COMPUTER NETWORKS, 2010, 79 : 263 - 268
  • [25] Secure User Authentication Using Honeywords
    Palaniappan, S.
    Parthipan, V
    Kirubakaran, S. Stewart
    Johnson, R.
    [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 896 - 903
  • [26] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
  • [27] Using Episodic Memory for User Authentication
    Woo, Simon S.
    Artstein, Ron
    Kaiser, Elsi
    Le, Xiao
    Mirkovic, Jelena
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2019, 22 (02)
  • [28] User authentication mechanism using authentication server in home network
    Lee, Y
    Ju, H
    Park, J
    Han, J
    [J]. 8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U503 - U506
  • [29] Detecting TV Program Highlight Scenes Using Twitter Data Classified by Twitter User Behavior
    Hayama, Tessai
    [J]. RECENT ADVANCES AND FUTURE PROSPECTS IN KNOWLEDGE, INFORMATION AND CREATIVITY SUPPORT SYSTEMS, 2018, 685 : 1 - 13
  • [30] Neural TV program recommendation with label and user dual attention
    Yin, Fulian
    Li, Sitong
    Ji, Meiqi
    Wang, Yanyan
    [J]. APPLIED INTELLIGENCE, 2022, 52 (01) : 19 - 32