• Title/Summary/Keyword: Internet Uses

Search Result 1,491, Processing Time 0.029 seconds

Optimised ML-based System Model for Adult-Child Actions Recognition

  • Alhammami, Muhammad;Hammami, Samir Marwan;Ooi, Chee-Pun;Tan, Wooi-Haw
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.929-944
    • /
    • 2019
  • Many critical applications require accurate real-time human action recognition. However, there are many hurdles associated with capturing and pre-processing image data, calculating features, and classification because they consume significant resources for both storage and computation. To circumvent these hurdles, this paper presents a recognition machine learning (ML) based system model which uses reduced data structure features by projecting real 3D skeleton modality on virtual 2D space. The MMU VAAC dataset is used to test the proposed ML model. The results show a high accuracy rate of 97.88% which is only slightly lower than the accuracy when using the original 3D modality-based features but with a 75% reduction ratio from using RGB modality. These results motivate implementing the proposed recognition model on an embedded system platform in the future.

A Study on Design and Implementation of a Programming Teaching Model Using Emotional Intelligence

  • Bae, Yesun;Jun, Woochun
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.125-132
    • /
    • 2018
  • In this paper, we design a programming education model that uses emotional intelligence and apply the model to programming education in elementary school. In our previous work, we found that there is a meaningful correlation between emotional intelligence and programming ability. In this paper, as a follow-up study, we design a programming education model based on a storytelling model and emotional intelligence. In order to test the performance of the proposed model, we applied our proposed model to the 5th grade elementary school students who have no programming experience. Based on extensive survey work and statistical analysis, we found that the experimental group by the programming education using the emotional intelligence got a statistically significant higher achievement than the comparative group by the traditional programming education. We hope that our model will be helpful in programming education in schools.

Control of Seesaw balancing using decision boundary based on classification method

  • Uurtsaikh, Luvsansambuu;Tengis, Tserendondog;Batmunkh, Amar
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.11-18
    • /
    • 2019
  • One of the key objectives of control systems is to maintain a system in a specific stable state. To achieve this goal, a variety of control techniques can be used and it is often uses a feedback control method. As known this kind of control methods requires mathematical model of the system. This article presents seesaw unstable system with two propellers which are controlled without use of a mathematical model instead. The goal was to control it using training data. For system control we use a logistic regression technique which is one of machine learning method. We tested our controller on the real model created in our laboratory and the experimental results show that instability of the seesaw system can be fixed at a given angle using the decision boundary estimated from the classification method. The results show that this control method for structural equilibrium can be used with relatively more accuracy of the decision boundary.

An LED SAHP-based Planar Projection PTCDV-hop Location Algorithm

  • Zhang, Yuexia;Chen, Hang;Jin, Jiacheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4541-4554
    • /
    • 2019
  • This paper proposes a planar projection DV-hop location algorithm (PTCDV-hop) based on the LED semi-angle at half power (SAHP, which accounts for LED SAHP characteristics in visible light communication (VLC)) and uses the DV-hop algorithm for range-free localization. Distances between source nodes and nodes positioned in three-dimensional indoor space are projected onto a two-dimensional plane to reduce complexity. Circles are structured by assigning source nodes (projected onto the horizontal plane of the assigned nodes) to be centers and the projection distances as radii. The proposed PTCDV-hop algorithm then determines the position of node location coordinates using the trilateral-weighted-centroid algorithm. Simulation results show localization errors of the proposed algorithm are on the order of magnitude of a millimeter when three sources are used. The PTCDV-hop algorithm has higher positioning accuracy and stronger dominance than the traditional DV-hop algorithm.

Large-Scale Phase Retrieval via Stochastic Reweighted Amplitude Flow

  • Xiao, Zhuolei;Zhang, Yerong;Yang, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4355-4371
    • /
    • 2020
  • Phase retrieval, recovering a signal from phaseless measurements, is generally considered to be an NP-hard problem. This paper adopts an amplitude-based nonconvex optimization cost function to develop a new stochastic gradient algorithm, named stochastic reweighted phase retrieval (SRPR). SRPR is a stochastic gradient iteration algorithm, which runs in two stages: First, we use a truncated sample stochastic variance reduction algorithm to initialize the objective function. The second stage is the gradient refinement stage, which uses continuous updating of the amplitude-based stochastic weighted gradient algorithm to improve the initial estimate. Because of the stochastic method, each iteration of the two stages of SRPR involves only one equation. Therefore, SRPR is simple, scalable, and fast. Compared with the state-of-the-art phase retrieval algorithm, simulation results show that SRPR has a faster convergence speed and fewer magnitude-only measurements required to reconstruct the signal, under the real- or complex- cases.

AR Tourism Recommendation System Based on Character-Based Tourism Preference Using Big Data

  • Kim, In-Seon;Jeong, Chi-Seo;Jung, Tae-Won;Kang, Jin-Kyu;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • The development of the fourth industry has enabled users to quickly share a lot of data online. We can analyze big data on information about tourist attractions and users' experiences and opinions using artificial intelligence. It can also analyze the association between characteristics of users and types of tourism. This paper analyzes individual characteristics, recommends customized tourist sites and proposes a system to provide the sacred texts of recommended tourist sites as AR services. The system uses machine learning to analyze the relationship between personality type and tourism type preference. Based on this, it recommends tourist attractions according to the gender and personality types of users. When the user finishes selecting a tourist destination from the recommendation list, it visualizes the information of the selected tourist destination with AR.

High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation

  • Li, Teng;Zhang, Yu;Wang, Sha;Sun, Jun-jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1521-1537
    • /
    • 2021
  • Through information hiding technique, secret message can be hidden in pictures. Stego-image quality and hiding capacity are two important metrics for information hiding. To enhance these metrics, many schemes were proposed by scholars in recent years. Some of them are effective and successful, but there is still a room for further improvement. A high capacity information hiding scheme (PAMO, Pixel-value Adjustment with Modulus Operation Algorithm) is introduced in this paper. PAMO scheme uses pixel value adjustment with modulus operation to hide confidential data in cover-image. PAMO scheme and some referenced schemes are implemented in Python and experiments are carried out to evaluate their performance. In the experiments, PAMO scheme shows better performance than other methods do. When secret message length is less than 72000 bits, the highest hiding capacity of PAMO can reach 7 bits per pixel, at the same time the PSNR of stego-images is greater than 30 dB.

LSTM-based Sales Forecasting Model

  • Hong, Jun-Ki
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1232-1245
    • /
    • 2021
  • In this study, prediction of product sales as they relate to changes in temperature is proposed. This model uses long short-term memory (LSTM), which has shown excellent performance for time series predictions. For verification of the proposed sales prediction model, the sales of short pants, flip-flop sandals, and winter outerwear are predicted based on changes in temperature and time series sales data for clothing products collected from 2015 to 2019 (a total of 1,865 days). The sales predictions using the proposed model show increases in the sale of shorts and flip-flops as the temperature rises (a pattern similar to actual sales), while the sale of winter outerwear increases as the temperature decreases.

Sum-Rate Performance of A NOMA-based Two-Way Relay Approach for A Two-User Cellular Network

  • Li, Guosheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1944-1956
    • /
    • 2021
  • This paper considers a cellular two-way relay network with one base station (BS), one relay station (RS), and two users. The two users are far from the BS and no direct links exist, and the two users exchange messages with the BS via the RS. A non-orthogonal multiple access (NOMA) and network coding (NC)-based decode-and-forward (DF) two-way relaying (TWR) scheme TWR-NOMA-NC is proposed, which is able to reduce the number of channel-uses to three from four in conventional time-division multiple access (TDMA) based TWR approaches. The achievable sum-rate performance of the proposed approach is analyzed, and a closed-form expression for the sum-rate upper bound is derived. Numerical results show that the analytical sum-rate upper bound is tight, and the proposed TWR-NOMA-NC scheme significantly outperforms the TDMA-based TWR and NOMA-based one-way relaying counterparts.

Implementation of Extracting Specific Information by Sniffing Voice Packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.209-214
    • /
    • 2020
  • VoIP technology has been widely used for exchanging voice or image data through IP networks. VoIP technology, often called Internet Telephony, sends and receives voice data over the RTP protocol during the session. However, there is an exposition risk in the voice data in VoIP using the RTP protocol, where the RTP protocol does not have a specification for encryption of the original data. We implement programs that can extract meaningful information from the user's dialogue. The meaningful information means the information that the program user wants to obtain. In order to do that, our implementation has two parts. One is the client part, which inputs the keyword of the information that the user wants to obtain, and the other is the server part, which sniffs and performs the speech recognition process. We use the Google Speech API from Google Cloud, which uses machine learning in the speech recognition process. Finally, we discuss the usability and the limitations of the implementation with the example.