• Title/Summary/Keyword: Computer Science Show

Search Result 3,085, Processing Time 0.031 seconds

On Linear Discriminant Procedures Based On Projection Pursuit Method

  • Hwang, Chang-Ha;Kim, Dae-Hak
    • Journal of the Korean Data and Information Science Society
    • /
    • v.5 no.1
    • /
    • pp.1-10
    • /
    • 1994
  • Projection pursuit(PP) is a computer-intensive method which seeks out interesting linear projections of multivariate data onto a lower dimension space by machine. By working with lower dimensional projections, projection pursuit avoids the sparseness of high dimensional data. We show through simulation that two projection pursuit discriminant mothods proposed by Chen(1989) and Huber(1985) do not improve very much the error rate than the existing methods and compare several classification procedures.

  • PDF

The Study of the Improvement of Nursing Department Computer Education to the Adaptation for the Hospital Information System (병원정보시스템 적응을 위한 간호학과 컴퓨터 교육 개선방안에 관한 연구)

  • Choung, Hye-Myoung
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.4
    • /
    • pp.59-69
    • /
    • 2008
  • This study show the improvement of the capability of the handling computer in the job to students in science of nursing though the investment of the capacity of the computer application and the realities of handling computer in real. A cause of the development of the Information Technology, currently in the view point of system management, the hospital works is manage by the HIS(Hospital Information System). The teaching of the computer application capability for the information in science of nursing must not be the one-way by supplier like one of the survey courses but must be adapted at real condition and to be focused to learner. Thus, we suggest that the education of the science of nursing should be changed from one of the survey courses to the education of the acquirement and experience on information system knowledge.

  • PDF

Adaptive Postprocessing Algorithm for Reduction of Blocking Artifacts Using Wavelet Transform and NNF

  • Kwon, Kee-Koo;Park, Kyung-Nam;Kim, Byung-Ju;Lee, Suk-Hwan;Kwon, Seong-Geun;Lee, Kuhn-Il
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1424-1427
    • /
    • 2002
  • This paper proposes a novel postprocessing algorithm for reducing the blocking artifacts in low bit rate block-based transform coded images, that use adaptive neural network filter (NNF) in wavelet transform domain. n this algorithm, after performing a 2-level wavelet transform of the decompressed image, the existence of locking artifacts is determined using statistical characteristic of neighborhood blocks. And then a different one-dimensional (1-D) or 2-D NNF is used to reduce the locking artifacts according to the classified regions. That is, for HL and LH subbands regions with the blocking artifacts, a different 1-D NNF is used. And 2-D NNF is used in HH subband. Experimental results show that the proposed algorithm produced better results than those of conventional algorithms both subjectively and objectively.

  • PDF

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.

Link Prediction Algorithm for Signed Social Networks Based on Local and Global Tightness

  • Liu, Miao-Miao;Hu, Qing-Cui;Guo, Jing-Feng;Chen, Jing
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.213-226
    • /
    • 2021
  • Given that most of the link prediction algorithms for signed social networks can only complete sign prediction, a novel algorithm is proposed aiming to achieve both link prediction and sign prediction in signed networks. Based on the structural balance theory, the local link tightness and global link tightness are defined respectively by using the structural information of paths with the step size of 2 and 3 between the two nodes. Then the total similarity of the node pair can be obtained by combining them. Its absolute value measures the possibility of the two nodes to establish a link, and its sign is the sign prediction result of the predicted link. The effectiveness and correctness of the proposed algorithm are verified on six typical datasets. Comparison and analysis are also carried out with the classical prediction algorithms in signed networks such as CN-Predict, ICN-Predict, and PSNBS (prediction in signed networks based on balance and similarity) using the evaluation indexes like area under the curve (AUC), Precision, improved AUC', improved Accuracy', and so on. Results show that the proposed algorithm achieves good performance in both link prediction and sign prediction, and its accuracy is higher than other algorithms. Moreover, it can achieve a good balance between prediction accuracy and computational complexity.

Animated Game-Based Learning of Data Structures In Professional Education

  • Waseemullah, Waseemullah;Kazi, Abdul Karim;Hyder, Muhammad Faraz;Basit, Faraz Abdul
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.1-6
    • /
    • 2022
  • Teaching and learning are one of the major issues during this pandemic (COVID-19). Since the pandemic started, there are many changes in teaching and learning styles as everything related to studies started online. Game-Based Learning has got remarkable importance in the educational system and pedagogy as an effective way of increasing student inspiration and engagement. In this field, most of the work has been carried out in digital games. This research uses an Animated Game-Based Learning design in enhancing student engagement and perception of learning. In teaching Computer Science (CS) concepts in higher education, to enhance the pedagogy activities in CS concepts, more specifically the concepts of "Data Structures (DS)" i.e., Array, Stack, and Queue concepts are focused. This study aims to observe the difference in students' learning with the use of different learning methods i.e., the traditional learning (TL) method and the Animated Game-Based Learning (AGBL) Method. The experimental results show that learning DS concepts has been improved by the AGBL method as compared to the TL method.

Hyperparameter Tuning Based Machine Learning classifier for Breast Cancer Prediction

  • Md. Mijanur Rahman;Asikur Rahman Raju;Sumiea Akter Pinky;Swarnali Akter
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.196-202
    • /
    • 2024
  • Currently, the second most devastating form of cancer in people, particularly in women, is Breast Cancer (BC). In the healthcare industry, Machine Learning (ML) is commonly employed in fatal disease prediction. Due to breast cancer's favorable prognosis at an early stage, a model is created to utilize the Dataset on Wisconsin Diagnostic Breast Cancer (WDBC). Conversely, this model's overarching axiom is to compare the effectiveness of five well-known ML classifiers, including Logistic Regression (LR), Decision Tree (DT), Random Forest (RF), K-Nearest Neighbor (KNN), and Naive Bayes (NB) with the conventional method. To counterbalance the effect with conventional methods, the overarching tactic we utilized was hyperparameter tuning utilizing the grid search method, which improved accuracy, secondary precision, third recall, and finally the F1 score. In this study hyperparameter tuning model, the rate of accuracy increased from 94.15% to 98.83% whereas the accuracy of the conventional method increased from 93.56% to 97.08%. According to this investigation, KNN outperformed all other classifiers in terms of accuracy, achieving a score of 98.83%. In conclusion, our study shows that KNN works well with the hyper-tuning method. These analyses show that this study prediction approach is useful in prognosticating women with breast cancer with a viable performance and more accurate findings when compared to the conventional approach.

MARS: Multiple Access Radio Scheduling for a Multi-homed Mobile Device in Soft-RAN

  • Sun, Guolin;Eng, Kongmaing;Yin, Seng;Liu, Guisong;Min, Geyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.79-95
    • /
    • 2016
  • In order to improve the Quality-of-Service (QoS) of latency sensitive applications in next-generation cellular networks, multi-path is adopted to transmit packet stream in real-time to achieve high-quality video transmission in heterogeneous wireless networks. However, multi-path also introduces two important challenges: out-of-order issue and reordering delay. In this paper, we propose a new architecture based on Software Defined Network (SDN) for flow aggregation and flow splitting, and then design a Multiple Access Radio Scheduling (MARS) scheme based on relative Round-Trip Time (RTT) measurement. The QoS metrics including end-to-end delay, throughput and the packet out-of-order problem at the receiver have been investigated using the extensive simulation experiments. The performance results show that this SDN architecture coupled with the proposed MARS scheme can reduce the end-to-end delay and the reordering delay time caused by packet out-of-order as well as achieve a better throughput than the existing SMOS and Round-Robin algorithms.

Stability Condition of Robust and Non-fragile $H^{\infty}$ Hovering Control with Real-time Tuning Available Fuzzy Compensator

  • Kim, Joon-Ki;Lim, Do-Hyung;Kim, Won-Ki;Kang, Soon-Ju;Park, Hong-Bae
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.4
    • /
    • pp.364-371
    • /
    • 2007
  • In this paper, we describe the synthesis of robust and non-fragile $H^{\infty}$ state feedback controllers for linear systems with affine parameter uncertainties, as well as a static state feedback controller with poly topic uncertainty. The sufficient condition of controller existence, the design method of robust and non-fragile $H^{\infty}$ static state feedback controller with fuzzy compensator, and the region of controllers that satisfies non-fragility are presented. We show that the resulting controller guarantees the asymptotic stability and disturbance attenuation of the closed loop system in spite of controller gain variations within a resulted polytopic region.

A Robust Method for Speech Replay Attack Detection

  • Lin, Lang;Wang, Rangding;Yan, Diqun;Dong, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.168-182
    • /
    • 2020
  • Spoofing attacks, especially replay attacks, pose great security challenges to automatic speaker verification (ASV) systems. Current works on replay attacks detection primarily focused on either developing new features or improving classifier performance, ignoring the effects of feature variability, e.g., the channel variability. In this paper, we first establish a mathematical model for replay speech and introduce a method for eliminating the negative interference of the channel. Then a novel feature is proposed to detect the replay attacks. To further boost the detection performance, four post-processing methods using normalization techniques are investigated. We evaluate our proposed method on the ASVspoof 2017 dataset. The experimental results show that our approach outperforms the competing methods in terms of detection accuracy. More interestingly, we find that the proposed normalization strategy could also improve the performance of the existing algorithms.