• Title/Summary/Keyword: Positive Computing

Search Result 247, Processing Time 0.025 seconds

Debugging of Parallel Programs using Distributed Cooperating Components

  • Mrayyan, Reema Mohammad;Al Rababah, Ahmad AbdulQadir
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.570-578
    • /
    • 2021
  • Recently, in the field of engineering and scientific and technical calculations, problems of mathematical modeling, real-time problems, there has been a tendency towards rejection of sequential solutions for single-processor computers. Almost all modern application packages created in the above areas are focused on a parallel or distributed computing environment. This is primarily due to the ever-increasing requirements for the reliability of the results obtained and the accuracy of calculations, and hence the multiply increasing volumes of processed data [2,17,41]. In addition, new methods and algorithms for solving problems appear, the implementation of which on single-processor systems would be simply impossible due to increased requirements for the performance of the computing system. The ubiquity of various types of parallel systems also plays a positive role in this process. Simultaneously with the growing demand for parallel programs and the proliferation of multiprocessor, multicore and cluster technologies, the development of parallel programs is becoming more and more urgent, since program users want to make the most of the capabilities of their modern computing equipment[14,39]. The high complexity of the development of parallel programs, which often does not allow the efficient use of the capabilities of high-performance computers, is a generally accepted fact[23,31].

Using Support Vector Machine to Predict Political Affiliations on Twitter: Machine Learning approach

  • Muhammad Javed;Kiran Hanif;Arslan Ali Raza;Syeda Maryum Batool;Syed Muhammad Ali Haider
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.217-223
    • /
    • 2024
  • The current study aimed to evaluate the effectiveness of using Support Vector Machine (SVM) for political affiliation classification. The system was designed to analyze the political tweets collected from Twitter and classify them as positive, negative, and neutral. The performance analysis of the SVM classifier was based on the calculation of metrics such as accuracy, precision, recall, and f1-score. The results showed that the classifier had high accuracy and f1-score, indicating its effectiveness in classifying the political tweets. The implementation of SVM in this study is based on the principle of Structural Risk Minimization (SRM), which endeavors to identify the maximum margin hyperplane between two classes of data. The results indicate that SVM can be a reliable classification approach for the analysis of political affiliations, possessing the capability to accurately categorize both linear and non-linear information using linear, polynomial or radial basis kernels. This paper provides a comprehensive overview of using SVM for political affiliation analysis and highlights the importance of using accurate classification methods in the field of political analysis.

The Effect of Novel Engineering-based Artificial Intelligence Education Program on Convergence Attitude of the Gifted Students in Computing Convergence

  • Ji-Yun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.307-316
    • /
    • 2024
  • In this paper, we attempted to apply a novel engineering-based artificial intelligence education program to elementary gifted students in computing convergence and confirm changes in their convergence attitudes. To this end, we analyzed previous research on novel engineering and artificial intelligence education for talented students, and based on this, we selected books to learn artificial intelligence concepts and principles for each topic and completed a 15-session educational program. The developed program was applied to 10 giftedness in computing convergence over 15 lessons, and as a result of conducting the same convergence attitude test before and after class, it was confirmed that it had a positive effect on convergence attitude. This study is significant in that it suggests the possibility of novel engineering for artificial intelligence convergence education of gifted students.

Public Sentiment Analysis and Topic Modeling Regarding COVID-19's Three Waves of Total Lockdown: A Case Study on Movement Control Order in Malaysia

  • Alamoodi, A.H.;Baker, Mohammed Rashad;Albahri, O.S.;Zaidan, B.B.;Zaidan, A.A.;Wong, Wing-Kwong;Garfan, Salem;Albahri, A.S.;Alonso, Miguel A.;Jasim, Ali Najm;Baqer, M.J.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2169-2190
    • /
    • 2022
  • The COVID-19 pandemic has affected many aspects of human life. The pandemic not only caused millions of fatalities and problems but also changed public sentiment and behavior. Owing to the magnitude of this pandemic, governments worldwide adopted full lockdown measures that attracted much discussion on social media platforms. To investigate the effects of these lockdown measures, this study performed sentiment analysis and latent Dirichlet allocation topic modeling on textual data from Twitter published during the three lockdown waves in Malaysia between 2020 and 2021. Three lockdown measures were identified, the related data for the first two weeks of each lockdown were collected and analysed to understand the public sentiment. The changes between these lockdowns were identified, and the latent topics were highlighted. Most of the public sentiment focused on the first lockdown as reflected in the large number of latent topics generated during this period. The overall sentiment for each lockdown was mostly positive, followed by neutral and then negative. Topic modelling results identified staying at home, quarantine and lockdown as the main aspects of discussion for the first lockdown, whilst importance of health measures and government efforts were the main aspects for the second and third lockdowns. Governments may utilise these findings to understand public sentiment and to formulate precautionary measures that can assure the safety of their citizens and tend to their most pressing problems. These results also highlight the importance of positive messaging during difficult times, establishing digital interventions and formulating new policies to improve the reaction of the public to emergency situations.

Exploring the acceptance forsubscription-based online services

  • Jo, Dong Hyuk
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.113-121
    • /
    • 2020
  • The era of "ownership" has gone, and the era of "subscription" has come. While traditional manufacturing and service industries are struggling with the fall of earnings rates, subscription-based businesses are showing high growth rates. Although subscription-based online services (SOS) are rapidly growing in the retail market, few studies have investigated factors that affect the decision of consumers to use SOS. Therefore, this study aims to identify factors that enable predicting consumers'attitudes and intentions toward SOS and to empirically verify the factors. As a result of the study, usefulness, enjoyment, and cost advantages were shown to have positive effectson perceived value, and usefulness, technicality, and cost advantages were shown to have positive effects on attitudes. In addition, perceived value was shown to have positive effects on attitude, and perceived value and attitudes were shown to have positive effects on acceptance intentions. The fact that the strategic directivity for successful introduction and diffusion of SOS was presented by identifying the predictor variables for the acceptance of SOS through this study can be said to be the significance of this study.

Frequency Matrix Based Summaries of Negative and Positive Reviews

  • Almuhannad Sulaiman Alorfi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.101-109
    • /
    • 2023
  • This paper discusses the use of sentiment analysis and text summarization techniques to extract valuable information from the large volume of user-generated content such as reviews, comments, and feedback on online platforms and social media. The paper highlights the effectiveness of sentiment analysis in identifying positive and negative reviews and the importance of summarizing such text to facilitate comprehension and convey essential findings to readers. The proposed work focuses on summarizing all positive and negative reviews to enhance product quality, and the performance of the generated summaries is measured using ROUGE scores. The results show promising outcomes for the developed methods in summarizing user-generated content.

Study on the Analysis of the Recognition and Improvements by Professors for the CAC(Computing Engineering Committee) (컴퓨터·정보(공)학 분야 공학교육인증제 운영성과에 대한 교수들의 인식 분석 및 개선방안 연구)

  • Han, Ji Young;Kang, So Yeon;Jeon, Ju Hyun
    • Journal of Engineering Education Research
    • /
    • v.19 no.5
    • /
    • pp.35-47
    • /
    • 2016
  • This study analyzed outcomes of CAC(Computing Accreditation Committee) program individually applied in the field of computing engineering since 2007, and draw improvements. Literature review through academic journals, survey research and the FGI(Focus Group Interview) were used to accomplish objectives of the study. In addition, the survey research and FGI were done for professors. For the survey research, nationally 20 out of 44 universities which operates the CAC program were investigated, and sample universities were considered by region. FGI was done to analyze the performance and problems of CAC in more detail for 6 experts. Results of the study were follows as; first, CAC program was activated through the Seoul Accord activation support business by government. Second, BSM(Basic Science and Math), engineering major and engineering design education have been strengthened compared with before and after of CAC introduction in the computing engineering field. Third, soft skills needed for students in the college of engineering have been organized in the professional general curriculum, and professors aware of improvement of ability of the students for the skills. The degree of satisfaction for the CAC program has been examined as normal level, but improvement of educational system and the overall quality enhancement of computing engineering education were affected by CAC program. Nonetheless of positive results of CAC program, incentive system for certification program graduates, the expansion of the autonomy of the department, reduction in the amount of self-evaluation report, and support of administrative human resources were suggested for taking root successfully of CAC program.

A Study on the Factors Affecting the Intention to use public Institution staff's Cloud Computing Service (공공기관 조직구성원의 클라우드 컴퓨팅 서비스 이용의도에 영향을 미치는 요인에 관한 연구)

  • Choi, Hyukra;Kim, SeonMyung
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.49-66
    • /
    • 2014
  • In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. However, as more and more information on individuals and companies are placed in the cloud, concerns on just how safe the computing environment is have gradually increased. In this study, it will be explored if key characteristics of cloud computing services would affect the behavioral intention to use public cloud computing services. A conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that perceived risk has statistically significant effect on the privacy concern of users and the privacy concern has a negative influence on the trust. Finally, the trust has a positive effect on the attitude and the attitude has statistically significant effect on use intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

A Case Study on the Information System Outsourcing based on the Utility Computing Concept (유틸리티 컴퓨팅(Utility Computing) 개념에 입각한 정보시스템 아웃소싱 사례에 대한 연구)

  • Hong, Hyun-Gi
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.213-228
    • /
    • 2005
  • Due to the rapid progress of IT utilization, many firms have been perplexed how to increase the productivity and efficiency of the Information System and also to reduce the Total Cost of Ownership (TCO) of IS Organization. This paper employs the lens of the competitive advantages through Information System Outsourcing (ISO) arrangement. And also the concept of the "Utility Computing" of IBM-VNS. The Information Outsourcing System(ISO) is the fully or partly endorsed IT Outsourcing method, that supplies IT infrastructure, application system and system maintenance service, as well for the company networks. Many companies have implemented their own Information System. But some of the projects were not successfully carried out. We found many reasons for such a unsatisfaction with the quality of the new Information system. In this paper we select the "HanGlas Group" as the Case Study for Information System Outsourcing to overcome such difficulties. Through this Case Study we will learn the positive and negative aspects of ISO based on Utility Computing.

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF