• Title/Summary/Keyword: Computer Model

Search Result 14,674, Processing Time 0.035 seconds

A Machine Learning Univariate Time series Model for Forecasting COVID-19 Confirmed Cases: A Pilot Study in Botswana

  • Mphale, Ofaletse;Okike, Ezekiel U;Rafifing, Neo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.225-233
    • /
    • 2022
  • The recent outbreak of corona virus (COVID-19) infectious disease had made its forecasting critical cornerstones in most scientific studies. This study adopts a machine learning based time series model - Auto Regressive Integrated Moving Average (ARIMA) model to forecast COVID-19 confirmed cases in Botswana over 60 days period. Findings of the study show that COVID-19 confirmed cases in Botswana are steadily rising in a steep upward trend with random fluctuations. This trend can also be described effectively using an additive model when scrutinized in Seasonal Trend Decomposition method by Loess. In selecting the best fit ARIMA model, a Grid Search Algorithm was developed with python language and was used to optimize an Akaike Information Criterion (AIC) metric. The best fit ARIMA model was determined at ARIMA (5, 1, 1), which depicted the least AIC score of 3885.091. Results of the study proved that ARIMA model can be useful in generating reliable and volatile forecasts that can used to guide on understanding of the future spread of infectious diseases or pandemics. Most significantly, findings of the study are expected to raise social awareness to disease monitoring institutions and government regulatory bodies where it can be used to support strategic health decisions and initiate policy improvement for better management of the COVID-19 pandemic.

Modified Nayak's Randomized Response Model

  • Lee, Gi-Sung;Hong, Ki-Hak
    • Communications for Statistical Applications and Methods
    • /
    • v.6 no.1
    • /
    • pp.117-130
    • /
    • 1999
  • Nayak(1994) suggested a combined randomized response model that combined the Warner's model and greenberg et al.'s model. In this paper we extend Nayak's model to two sample case of including unknown unrelated character also propose some combined models such W-M model and G-M model that modify the Nayak's model. We suggest the efficiency conditions of our models for Nayak's model, also find the efficiency condition of G-M model for the W-M model.

  • PDF

Accuracy evaluation of dental models manufactured by CAD/CAM milling method and 3D printing method

  • Jeong, Yoo-Geum;Lee, Wan-Sun;Lee, Kyu-Bok
    • The Journal of Advanced Prosthodontics
    • /
    • v.10 no.3
    • /
    • pp.245-251
    • /
    • 2018
  • PURPOSE. To evaluate the accuracy of a model made using the computer-aided design/computer-aided manufacture (CAD/CAM) milling method and 3D printing method and to confirm its applicability as a work model for dental prosthesis production. MATERIALS AND METHODS. First, a natural tooth model (ANA-4, Frasaco, Germany) was scanned using an oral scanner. The obtained scan data were then used as a CAD reference model (CRM), to produce a total of 10 models each, either using the milling method or the 3D printing method. The 20 models were then scanned using a desktop scanner and the CAD test model was formed. The accuracy of the two groups was compared using dedicated software to calculate the root mean square (RMS) value after superimposing CRM and CAD test model (CTM). RESULTS. The RMS value ($152{\pm}52{\mu}m$) of the model manufactured by the milling method was significantly higher than the RMS value ($52{\pm}9{\mu}m$) of the model produced by the 3D printing method. CONCLUSION. The accuracy of the 3D printing method is superior to that of the milling method, but at present, both methods are limited in their application as a work model for prosthesis manufacture.

A Study on the Acceptance of Wearable Computers based on the Extended Technology Acceptance Model (확장된 혁신기술수용모델을 이용한 웨어러블 컴퓨터의 수용에 관한 연구)

  • Lee, Hyun-Mee
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.6
    • /
    • pp.1155-1172
    • /
    • 2009
  • Wearable computers can be defined as next generation clothing integrated with various digital functions and devices. Unlike existing computers, they are viewed as human-centric computers customized for information utilization and other specific human needs. This study is intended to discover how consumers are accepting wearable computers, which are different from existing computers, based on Technology Acceptance Model(TAM) and to extend the model by adding variable regarding acceptance of wearable computers. A total of 683 copies of questionnaires, distributed to those aged 19 and older, both male and female, were collected online. The data was statistically analyzed for this study using the extended TAM. In order to test hypotheses, the structural equation model using the Lisrel 8.30 version was performed. For analyzing constructs(or traits) of research model, exploratory factor was conducted and the measurement model was assessed from the result. Reliability was assessed through confirmatory factor analysis and the calculation of Cronbach's alpha coefficients. Overall, model fit was assessed by statistical indexes: Chi-square value, GFI, AGFI, and RMR. This study analyzed the process of acceptance of wearable computers with the extended TAM that includes a variable, perceived value, on the basis of previous studies. The results of the analysis revealed that attitude toward wearable computer was directly influenced by perceived usefulness and perceived value but indirectly influenced by perceived ease of use. Acceptance intention of the wearable computer was directly influenced by perceived value and attitude toward wearable computer. To be more specific, perceived usefulness was significantly correlated with both attitude toward wearable computer and acceptance intention of the wearable computer. Perceived value was also significantly correlated with both attitude toward wearable computer and acceptance intention of the wearable computer. The results of this study also suggested that perceived ease of use was actually a causal antecedent to perceived usefulness and perceived value. This research revealed that extended TAM to investigate the acceptance of wearable computer was appropriate. This study is intended to provide a theoretical framework for adoption of wearable computer and suggest empirical analysis that can serve as a guide for wearable computer.

  • PDF

A Change Point Problem in the Regression Model When the Errors are Correlated

  • Cho, Sinsup;Cho, Kwan Ho;Song, Moon Sup
    • Journal of Korean Society for Quality Management
    • /
    • v.16 no.2
    • /
    • pp.68-81
    • /
    • 1988
  • Testing procedures for a detection of change point in the regression model with correlated errors are discussed. A Bayesian approach is adopted and applied to a regression model with errors following an AR(1) model.

  • PDF

FLUID MODEL SOLUTION OF FEEDFORWARD NETWORK OF OVERLOADED MULTICLASS PROCESSOR SHARING QUEUES

  • AMAL EZZIDANI;ABDELGHANI BEN TAHAR;MOHAMED HANINI
    • Journal of applied mathematics & informatics
    • /
    • v.42 no.2
    • /
    • pp.291-303
    • /
    • 2024
  • In this paper, we consider a feedforward network of overloaded multiclass processor sharing queues and we give a fluid model solution under the condition that the system is initially empty. The main theorem of the paper provides sufficient conditions for a fluid model solution to be linear with time. The results are illustrated through examples.

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.

Vibration characteristic analysis of differential floating mass transducer using electrical model for fully-implantable middle ear hearing devices (전기 모델에 의한 완전 이식형 인공중이용 차동 전자 트랜스듀서의 진동 특성 해석)

  • Kim, Min-Woo;Kim, Min-Kyu;Seong, Ki-Woong;Lim, Hyung-Gyu;Jung, Eui-Sung;Han, Ji-Hun;Park, Il-Yong;Cho, Jin-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.165-173
    • /
    • 2007
  • A differential floating mass transducer has been developed in Korea for fully implantable middle ear hearing devices (F-IMEHDs). In particular, the performance of a differential floating mass transducer (DFMT) is very important among the parts of the F-IMEHDs because the mechanical vibration generated by DFMT is delivered to the inner ear directly. In this paper, the electrical model is proposed to analyze the DFMT vibration characteristic using the mechanical model of the DFMT. The electrical model enables the simple analysis of DFMT vibration characteristics using a computer program. The proposed electrical model is simulated through PSpice as changing the values of passive elements in the electrical model. To verify the proposed model, the DFMT has been implemented on the basis of the simulated results and the experiment for vibration measurement has been carried out. Through the comparison, it is verified that the proposed model is useful to analyze the vibration characteristics of the DFMT.

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a;AlSuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.310-318
    • /
    • 2022
  • Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

Latest Transformations of XP Process Model: A Systematic Literature Review

  • Khan, Sadia;Fahiem, Muhammad Abuzar;Bakhtawar, Birra;Aftab, Shabib;Ahmad, Munir;Aziz, Nauman;Almotilag, Abdullah;Elmitwally, Nouh Sabri
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.143-150
    • /
    • 2021
  • Process model is an integral part of software industry. Different process models are used now a days in the industry for different software projects. Process models need to be tailored to address some specific project needs. Agile models are considered as the most widely used process models nowadays. They have distinctive features and the ability to address the dynamic needs of today's software development. Extreme programming (XP) is one of the extensively used agile process model especially for small projects. Many researchers have tried to mold XP to overcome its shortcomings and for better working in specific scenarios. Therefore, many customized versions of XP process model are available today. In this paper, we are going to analyze the latest customizations of XP. For this purpose, a systematic literature review is conducted on studies published from 2012 till 2018 in renowned online search libraries. This comprehensive review highlights the purpose of customizations, along with the areas in which customizations are made, and phases & practices which are being customized. This work will serve the researchers to discover the modern versions of XP process model as well as will provide a baseline for future directions for customizations.