• 제목/요약/키워드: Computer Model

검색결과 14,736건 처리시간 0.042초

A Deep Learning Model for Predicting User Personality Using Social Media Profile Images

  • Kanchana, T.S.;Zoraida, B.S.E.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.265-271
    • /
    • 2022
  • Social media is a form of communication based on the internet to share information through content and images. Their choice of profile images and type of image they post can be closely connected to their personality. The user posted images are designated as personality traits. The objective of this study is to predict five factor model personality dimensions from profile images by using deep learning and neural networks. Developed a deep learning framework-based neural network for personality prediction. The personality types of the Big Five Factor model can be quantified from user profile images. To measure the effectiveness, proposed two models using convolution Neural Networks to classify each personality of the user. Done performance analysis among two different models for efficiently predict personality traits from profile image. It was found that VGG-69 CNN models are best performing models for producing the classification accuracy of 91% to predict user personality traits.

Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise

  • Priya, A.Sagaya;Kumar, S.Britto Ramesh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.97-102
    • /
    • 2022
  • Network intrusion detection is becoming an increasing necessity for both organizations and individuals alike. Detecting intrusions is one of the major components that aims to prevent information compromise. Automated systems have been put to use due to the voluminous nature of the domain. The major challenge for automated models is the noise and data imbalance components contained in the network transactions. This work proposes an ensemble model, Attribute Subset Selector Bagging (ASUB) that can be used to effectively handle noise and data imbalance. The proposed model performs attribute subset based bag creation, leading to reduction of the influence of the noise factor. The constructed bagging model is heterogeneous in nature, hence leading to effective imbalance handling. Experiments were conducted on the standard intrusion detection datasets KDD CUP 99, Koyoto 2006 and NSL KDD. Results show effective performances, showing the high performance of the model.

NB-IoT 기술에서 Multiple Linear Regression Model을 활용하여 OTDOA 기반 포지셔닝 정확도 최적화 (Optimize OTDOA-based Positioning Accuracy by Utilizing Multiple Linear Regression Model under NB-IoT Technology)

  • 판이첸;김재수
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2020년도 제62차 하계학술대회논문집 28권2호
    • /
    • pp.139-142
    • /
    • 2020
  • NB-IoT(Narrow Band Internet of Things) is an emerging LPWAN(Low Power Wide Area Network) radio technology. NB-IoT has many advantages like low power, low cost, and high coverage. However low bandwidth and low sampling rates also lead to poor positioning accuracy. This paper proposed a solution to optimize positioning accuracy under the OTDOA(Observed Time Difference of Arrival) approach by utilizing MLR(Multiple Linear Regression) models. Through the MLR model to predict the influence degree of weather(temperature, humidity, light intensity and air pressure) on the arrival time of signal transmission to improve the measurement accuracy. The improvement of measurement accuracy can greatly improve IoT applications based on NB-IoT.

  • PDF

비즈니스 이벤트 스트리밍 대한 연속 질의 처리 (Continuous Query over Business Event Streams in EPCIS Middleware)

  • 박영욱;홍봉희;박재관;김기홍
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2008년도 춘계학술발표대회
    • /
    • pp.718-720
    • /
    • 2008
  • In this paper, the study focus on continuous query in EPC Information Services(EPCIS) middleware which is a component of RFID system. We can consider EPCIS as a data stream system with a repository. In our work continuous query is implemented in two query execution model. One is standing query model another is traditional query execution model in which continuous query run over database periodically. Furthermore a balance strategy is presented. It is used to determine which continuous query implementation model is suitable for the query. Finally we conclude our work and issue some research topic for future work.

Phrase-based Topic and Sentiment Detection and Tracking Model using Incremental HDP

  • Chen, YongHeng;Lin, YaoJin;Zuo, WanLi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.5905-5926
    • /
    • 2017
  • Sentiments can profoundly affect individual behavior as well as decision-making. Confronted with the ever-increasing amount of review information available online, it is desirable to provide an effective sentiment model to both detect and organize the available information to improve understanding, and to present the information in a more constructive way for consumers. This study developed a unified phrase-based topic and sentiment detection model, combined with a tracking model using incremental hierarchical dirichlet allocation (PTSM_IHDP). This model was proposed to discover the evolutionary trend of topic-based sentiments from online reviews. PTSM_IHDP model firstly assumed that each review document has been composed by a series of independent phrases, which can be represented as both topic information and sentiment information. PTSM_IHDP model secondly depended on an improved time-dependency non-parametric Bayesian model, integrating incremental hierarchical dirichlet allocation, to estimate the optimal number of topics by incrementally building an up-to-date model. To evaluate the effectiveness of our model, we tested our model on a collected dataset, and compared the result with the predictions of traditional models. The results demonstrate the effectiveness and advantages of our model compared to several state-of-the-art methods.

TMUML: A Singular TM Model with UML Use Cases and Classes

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.127-136
    • /
    • 2021
  • In the systems and software modeling field, a conceptual model involves modeling with concepts to support development and design. An example of a conceptual model is a description developed using the Unified Modeling Language (UML). UML uses a model multiplicity formulation approach, wherein a number of models are used to represent alternative views. By contrast, a model singularity approach uses only a single integrated model. Each of these styles of modeling has its strengths and weaknesses. This paper introduces a partial solution to the issue of multiplicity vs. singularity in modeling by adopting UML use cases and class models into the conceptual thinging machine (TM) model. To apply use cases, we adopt the observation that a use-case diagram is a description that shows the internal structure of the part of the system represented by the use case in addition to being useful to people outside of the system. Additionally, the UML class diagram is recast in TM representation. Accordingly, we develop a TMUML model that embraces the TM specification of the UML class diagram and the internal structure extracted from the UML use case. TMUML modeling introduces some of the advantages that have made UML a popular modeling language to TM modeling. At the same time, this approach supplies UML with partial model singularity. The paper details experimentation with TMUML using examples from the literature. Our results indicate that mixing UML with other models could be a viable approach.

Time Series Crime Prediction Using a Federated Machine Learning Model

  • Salam, Mustafa Abdul;Taha, Sanaa;Ramadan, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.119-130
    • /
    • 2022
  • Crime is a common social problem that affects the quality of life. As the number of crimes increases, it is necessary to build a model to predict the number of crimes that may occur in a given period, identify the characteristics of a person who may commit a particular crime, and identify places where a particular crime may occur. Data privacy is the main challenge that organizations face when building this type of predictive models. Federated learning (FL) is a promising approach that overcomes data security and privacy challenges, as it enables organizations to build a machine learning model based on distributed datasets without sharing raw data or violating data privacy. In this paper, a federated long short- term memory (LSTM) model is proposed and compared with a traditional LSTM model. Proposed model is developed using TensorFlow Federated (TFF) and the Keras API to predict the number of crimes. The proposed model is applied on the Boston crime dataset. The proposed model's parameters are fine tuned to obtain minimum loss and maximum accuracy. The proposed federated LSTM model is compared with the traditional LSTM model and found that the federated LSTM model achieved lower loss, better accuracy, and higher training time than the traditional LSTM model.

2012년 신 개정 정보 교육과정의 '문제 해결 방법과 절차' 영역을 위한 수업 모형 개발 (Development of Teaching Model for 'Problem-solving methods and procedures' section in the 2012's revised Informatics curriculum)

  • 현태익;최재혁;이종희
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권8호
    • /
    • pp.189-201
    • /
    • 2012
  • 이 연구는 일반계고등학교 신 개정 정보 교육과정의 '문제 해결 방법과 절차' 영역의 효과적인 교수 학습을 위한 수업 모형을 개발하고 그것의 효과성을 검증하는데 목적이 있다. 중학교에서 이 영역을 학습하지 못한 일반계 고등학생들을 위해 중학교 교육과정을 포함할 필요가 있고, 학습자의 발달 단계에 알맞은 프로그래밍 언어를 채택하여 인지적 부담을 줄일 필요가 있다. 재미있게 프로그래밍 할 수 있는 퍼즐을 학습 예제로 사용할 필요가 있다. 연구 수행을 위한 연구 방법은 ADDIE 모형에 따라 수행한다. 수업 모형의 프로그래밍 언어로는 파이썬을 선택한다. 이 수업 모형의 효과성을 평가하고자 컴퓨터 부 학생들을 대상으로 수업을 진행하였고, 컴퓨터교육과 예비 교사들이 모의수업을 하였다. 예비교사의 75%가 수업 모형에 만족하였다. 2012년 3월부터 23시간동안 일반계고등학교 정보 교과 수업에 적용하였다. 수업 전 후에 문제해결력 향상 여부를 알아보기 위해 PSI 검사를 하고, 중간고사 정보 점수와 비교하여 약간의 정상관관계가 있다고 분석하였다. 따라서 개발한 수업 모형이 위 영역의 교수 학습에 효과가 있다고 분석한다. 그러므로 정보 교사들의 교수 학습 수업 모형의 지표가 되고, 예비 교사의 교육 자료로 활용하는 것을 제안한다.

Analysis of Break in Presence During Game Play Using a Linear Mixed Model

  • Chung, Jae-Yong;Yoon, Hwan-Jin;Gardne, Henry J.
    • ETRI Journal
    • /
    • 제32권5호
    • /
    • pp.687-694
    • /
    • 2010
  • Breaks in presence (BIP) are those moments during virtual environment (VE) exposure in which participants become aware of their real world setting and their sense of presence in the VE becomes disrupted. In this study, we investigate participants' experience when they encounter technical anomalies during game play. We induced four technical anomalies and compared the BIP responses of a navigation mode game to that of a combat mode game. In our analysis, we applied a linear mixed model (LMM) and compared the results with those of a conventional regression model. Results indicate that participants felt varied levels of impact and recovery when experiencing the various technical anomalies. The impact of BIPs was clearly affected by the game mode, whereas recovery appears to be independent of game mode. The results obtained using the LMM did not differ significantly from those obtained using the general regression model; however, it was shown that treatment effects could be improved by consideration of random effects in the regression model.

Building a Fuzzy Model with Transparent Membership Functions through Constrained Evolutionary Optimization

  • Kim, Min-Soeng;Kim, Chang-Hyun;Lee, Ju-Jang
    • International Journal of Control, Automation, and Systems
    • /
    • 제2권3호
    • /
    • pp.298-309
    • /
    • 2004
  • In this paper, a new evolutionary scheme to design a TSK fuzzy model from relevant data is proposed. The identification of the antecedent rule parameters is performed via the evolutionary algorithm with the unique fitness function and the various evolutionary operators, while the identification of the consequent parameters is done using the least square method. The occurrence of the multiple overlapping membership functions, which is a typical feature of unconstrained optimization, is resolved with the help of the proposed fitness function. The proposed algorithm can generate a fuzzy model with transparent membership functions. Through simulations on various problems, the proposed algorithm found a TSK fuzzy model with better accuracy than those found in previous works with transparent partition of input space.