• Title/Summary/Keyword: Method of Information System

Search Result 20,620, Processing Time 0.053 seconds

An Improved Text Classification Method for Sentiment Classification

  • Wang, Guangxing;Shin, Seong Yoon
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.1
    • /
    • pp.41-48
    • /
    • 2019
  • In recent years, sentiment analysis research has become popular. The research results of sentiment analysis have achieved remarkable results in practical applications, such as in Amazon's book recommendation system and the North American movie box office evaluation system. Analyzing big data based on user preferences and evaluations and recommending hot-selling books and hot-rated movies to users in a targeted manner greatly improve book sales and attendance rate in movies [1, 2]. However, traditional machine learning-based sentiment analysis methods such as the Classification and Regression Tree (CART), Support Vector Machine (SVM), and k-nearest neighbor classification (kNN) had performed poorly in accuracy. In this paper, an improved kNN classification method is proposed. Through the improved method and normalizing of data, the purpose of improving accuracy is achieved. Subsequently, the three classification algorithms and the improved algorithm were compared based on experimental data. Experiments show that the improved method performs best in the kNN classification method, with an accuracy rate of 11.5% and a precision rate of 20.3%.

A depth-based Multi-view Super-Resolution Method Using Image Fusion and Blind Deblurring

  • Fan, Jun;Zeng, Xiangrong;Huangpeng, Qizi;Liu, Yan;Long, Xin;Feng, Jing;Zhou, Jinglun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5129-5152
    • /
    • 2016
  • Multi-view super-resolution (MVSR) aims to estimate a high-resolution (HR) image from a set of low-resolution (LR) images that are captured from different viewpoints (typically by different cameras). MVSR is usually applied in camera array imaging. Given that MVSR is an ill-posed problem and is typically computationally costly, we super-resolve multi-view LR images of the original scene via image fusion (IF) and blind deblurring (BD). First, we reformulate the MVSR problem into two easier problems: an IF problem and a BD problem. We further solve the IF problem on the premise of calculating the depth map of the desired image ahead, and then solve the BD problem, in which the optimization problems with respect to the desired image and with respect to the unknown blur are efficiently addressed by the alternating direction method of multipliers (ADMM). Our approach bridges the gap between MVSR and BD, taking advantages of existing BD methods to address MVSR. Thus, this approach is appropriate for camera array imaging because the blur kernel is typically unknown in practice. Corresponding experimental results using real and synthetic images demonstrate the effectiveness of the proposed method.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

A Study for a Method of Designing of Security Domain Infrastructure and Its Efficiency Measuring (네트워크 보안 서비스 향상을 위한 도메인 구조설계와 성능분석 방법)

  • Moon, Song-Chul;Noh, Si-Choon;Jung, Ji-Moon
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.331-339
    • /
    • 2010
  • On intranet system, it is essential element for providing information to decrease response time. To realize this efficiencies of response time of the network, a lot of research have been conducted. The purpose of the research and implementation is to shorten the response time of information system. We can realize final goal of information system through fast response time. This final goal of information system is to secure the performance efficiency within the required time. In order to acquire the method of warranty of fast response time, the efficient measurement method is essential. This research suggests a latency test techniques being used on infrastructure system and also offers a response time measurement methodology. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method. Also it is possible to develop a enhanced networking capabilities, and information system capabilities for the development of information system.

Finding Optimal Controls for Helicopter Maneuvers Using the Direct Multiple-Shooting Method

  • Kim, Min-Jae;Hong, Ji-Seung;Kim, Chang-Joo
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.11 no.1
    • /
    • pp.10-18
    • /
    • 2010
  • The purpose of this paper deals with direct multiple-shooting method (DMS) to resolve helicopter maneuver problems of helicopters. The maneuver problem is transformed into nonlinear problems and solved DMS technique. The DMS method is easy in handling constraints and it has large convergence radius compared to other strategies. When parameterized with piecewise constant controls, the problems become most effectively tractable because the search direction is easily estimated by solving the structured Karush-Kuhn-Tucker (KKT) system. However, generally the computation of function, gradients and Hessian matrices has considerably time-consuming for complex system such as helicopter. This study focused on the approximation of the KKT system using the matrix exponential and its integrals. The propose method is validated by solving optimal control problems for the linear system where the KKT system is exactly expressed with the matrix exponential and its integrals. The trajectory tracking problem of various maneuvers like bob up, sidestep near hovering flight speed and hurdle hop, slalom, transient turn, acceleration and deceleration are analyzed to investigate the effects of algorithmic details. The results show the matrix exponential approach to compute gradients and the Hessian matrix is most efficient among the implemented methods when combined with the mixed time integration method for the system dynamics. The analyses with the proposed method show good convergence and capability of tracking the prescribed trajectory. Therefore, it can be used to solve critical areas of helicopter flight dynamic problems.

Performance Evaluation of a Multi - Item Production System Operated by the CONWIP Control Mechanism (CONWIP 통제방식에 의해 운영되는 다품목 생산시스템의 성능평가)

  • Park, Chan-Woo;Lee, Hyo-Seong;Kim, Chang-Gon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.28 no.1
    • /
    • pp.1-13
    • /
    • 2002
  • We study a multi-component production/inventory system in which individual components are made to meet various demand types. We assume that the demands arrive according to a Poisson process, but there is a fixed probability that a demand requests a particular kit of different components. Each component is produced by a flow line with several stations. The production of each component is operated by the CONWIP control mechanism. To analyse this system, we propose an approximation method based on aggregation method. In application of the aggregation method, a product-form approximation technique as well as a matrix-geometric method is used. Comparisons with simulation show that the approximation method provides fairly good results.

Evaluating Level of Information Provided According to User Satisfaction of VMS on the Continuous Traffic Flow (연속류 도로 VMS의 이용자를 고려한 정보제공수준 평가)

  • Sin, So-Yeong;Lee, Su-Beom;Im, Jun-Beom;Hong, Ji-Yeon
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.3
    • /
    • pp.49-58
    • /
    • 2011
  • As a part of the ITS, the traffic information system is more widely adopted to deliver traffic information to vehicle drivers via various types of media. As the ITS system establishment has been recognized as somewhat accomplished, the focus has shifted to the efficient operation and maintenance of the system. In this paper, we propose a method for evaluating a VMS traffic information service system from a user's perspective. In particular, relational expressions for the level of information provided and the level of user satisfaction are generated for the evaluation to take place from the user psychological satisfaction aspect of all other beneficial features of the system. As continuous flow facility is the one that has limited entry and exit, the traffic information of VMS plays a significant role for vehicle drivers to make their decisions. A method suggested in this paper could be used for evaluating an existing system as well as setting up the target service level of the system of a new system. If individual system properties are considered along with various VMS functions being as supplement of this research, more systematic evaluation method could be arranged.

Study on Data Control System Design Method with Complex Data-Algorithm Data Processing (복합적 자료-알고리즘 자료처리 방식을 적용한 자료처리 시스템 설계 방안 연구)

  • Kim, Min Wook;Park, Yeon Gu;Yi, Jonghyuk;Lee, Jeong-Deok
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.11-15
    • /
    • 2015
  • In this study, we present the architecture design of data control system in water hazard information platform with analyzing the complexity of the data processing. Generally, data control systems in data collection and analysis platforms base on the constant data-algorithm data processing meaning that data processing between data and algorithm is fixed. But the number of data processing in data control system is rapidly increasing because of increasing of complexity of system. To hold down the number of data processing, dynamic data-algorithm data processing is able to be applied to data control system. After comparison each data-algorithm data processing method, we suggest design method of the data control system optimizing water hazard information platform.

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

Time-Discretization of Time Delayed Non-Affine System via Taylor-Lie Series Using Scaling and Squaring Technique

  • Zhang Yuanliang;Chong Kil-To
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.3
    • /
    • pp.293-301
    • /
    • 2006
  • A new discretization method for calculating a sampled-data representation of a nonlinear continuous-time system is proposed. The proposed method is based on the well-known Taylor series expansion and zero-order hold (ZOH) assumption. The mathematical structure of the new discretization method is analyzed. On the basis of this structure, a sampled-data representation of a nonlinear system with a time-delayed input is derived. This method is applied to obtain a sampled-data representation of a non-affine nonlinear system, with a constant input time delay. In particular, the effect of the time discretization method on key properties of nonlinear control systems, such as equilibrium properties and asymptotic stability, is examined. 'Hybrid' discretization schemes that result from a combination of the 'scaling and squaring' technique with the Taylor method are also proposed, especially under conditions of very low sampling rates. Practical issues associated with the selection of the method parameters to meet CPU time and accuracy requirements are examined as well. The performance of the proposed method is evaluated using a nonlinear system with a time-delayed non-affine input.