• Title/Summary/Keyword: field task

Search Result 867, Processing Time 0.027 seconds

A Case Study: Unsupervised Approach for Tourist Profile Analysis by K-means Clustering in Turkey

  • Yildirim, Mustafa Eren;Kaya, Murat;FurkanInce, Ibrahim
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Data mining is the task of accessing useful information from a large capacity of data. It can also be referred to as searching for correlations that can provide clues about the future in large data warehouses by using computer algorithms. It has been used in the tourism field for marketing, analysis, and business improvement purposes. This study aims to analyze the tourist profile in Turkey through data mining methods. The reason relies behind the selection of Turkey is the fact that Turkey welcomes millions of tourist every year which can be a role model for other touristic countries. In this study, an anonymous and large-scale data set was used under the law on the protection of personal data. The dataset was taken from a leading tourism company that is still active in Turkey. By using the k-means clustering algorithm on this data, key parameters of profiles were obtained and people were clustered into groups according to their characteristics. According to the outcomes, distinguishing characteristics are gathered under three main titles. These are the age of the tourists, the frequency of their vacations and the period between the reservation and the vacation itself. The results obtained show that the frequency of tourist vacations, the time between bookings and vacations, and age are the most important and characteristic parameters for a tourist's profile. Finally, planning future investments, events and campaign packages can make tourism companies more competitive and improve quality of service. For both businesses and tourists, it is advantageous to prepare individual events and offers for the three major groups of tourists.

The role of basolateral amygdala orexin 1 receptors on the modulation of pain and psychosocial deficits in nitroglycerin-induced migraine model in adult male rats

  • Askari-Zahabi, Khadijeh;Abbasnejad, Mehdi;Kooshki, Razieh;Raoof, Maryam;Esmaeili-Mahani, Saeed;Pourrahimi, Ali Mohammad;Zamyad, Mahnaz
    • The Korean Journal of Pain
    • /
    • v.35 no.1
    • /
    • pp.22-32
    • /
    • 2022
  • Background: Migraine headaches have been associated with sensory hyperactivity and anomalies in social/emotional responses. The main objective of this study was to evaluate the potential involvement of orexin 1 receptors (Orx1R) within the basolateral amygdala (BLA) in the modulation of pain and psychosocial dysfunction in a nitroglycerin (NTG)-induced rat model of migraine. Methods: Adult male Wistar rats were injected with NTG (5 mg/kg, intraperitoneal) every second day over nine days to induce migraine. The experiments were done in the following six groups (6 rats per group): untreated control, NTG, NTG plus vehicle, and NTG groups that were post-treated with intra-BLA microinjection of Orx1R antagonist SB-334867 (10, 20, and 40 nM). Thermal hyperalgesia was assessed using the hot plate and tail-flick tests. Moreover, the elevated plus maze (EPM) and open field (OF) tests were used to assess anxiety-like behaviors. The animals' sociability was evaluated using the three-chamber social task. The NTG-induced photophobia was assessed using a light-dark box. Results: We observed no change in NTG-induced thermal hyperalgesia following administration of SB-334867 (10, 20, and 40 nM). However, SB-334867 (20 and 40 nM) aggravated the NTG-induced anxiogenic responses in both the EPM and OF tasks. The NTG-induced social impairment was overpowered by SB-334867 at all doses. Time spent in the dark chamber of light-dark box was significantly increased in rats treated with SB-334867 (20 and 40 nM/rat). Conclusions: The findings suggest a role for Orx1R within the BLA in control comorbid affective complaints with migraine in rats.

Analysis of the Construction Cost Prediction Performance according to Feature Scaling and Log Conversion of Target Variable (피처 스케일링과 타겟변수 로그변환에 따른 건축 공사비 예측 성능 분석)

  • Kang, Yoon-Ho;Yun, Seok-Heon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.3
    • /
    • pp.317-326
    • /
    • 2022
  • With the development of various technologies in the area of artificial intelligence, a number of studies to application of artificial intelligence technology in the construction field are underway. Diverse technologies have been applied to the task of predicting construction costs, and construction cost prediction technologies applying artificial intelligence technologies have recently been developed. However, it is difficult to secure the vast amount of construction cost data required for machine learning, which has not yet been practically used. In this study, to predict the construction cost, the latest artificial neural network(ANN) method is used to propose a method to improve the construction cost prediction performance. In particular, to improve predictive performance, a log conversion method of target variables and a feature scaling method to eliminate the difference in the relative influence of each column data are applied, and their performance in predicting construction cost is compared and analyzed.

Ten Tips for Performing Your First Peer Review: The Next Step for the Aspiring Academic Plastic Surgeon

  • Frendo, Martin;Frithioff, Andreas;Andersen, Steven Arild Wuyts
    • Archives of Plastic Surgery
    • /
    • v.49 no.4
    • /
    • pp.538-542
    • /
    • 2022
  • Performing the first peer review of a plastic surgical research article can be an overwhelming task. However, it is an essential scholarly skill and peer review is used in a multitude of settings: evaluation of journal articles, conference abstracts, and research proposals. Furthermore, peer reviewing provides more than just the opportunity to read and help improve other's work: peer reviewing can improve your own scientific writing. A structured approach is possible and recommended. In these ten tips, we provide guidance on how to successfully conduct the first peer reviews. The ten tips on peer reviewing concern: 1) Appropriateness: are you qualified and prepared to perform the peer review? 2) Familiarization with the journal and its reviewing guidelines; 3) Gathering first impressions of the paper followed by specific tips for reviewing; 4) the abstract and introduction; 5) Materials, methods, and results (including statistical considerations); and 6) discussion, conclusion, and references. Tip 7 concerns writing and structuring the review; Tips 7 and 8 describe how to provide constructive criticism and understanding the limits of your expertise. Finally, Tip 10 details why-and how-you become a peer reviewer. Peer review can be done by any plastic surgeon, not just those interested in an academic career. These ten tips provide useful insights for both the aspiring and the experienced peer reviewer. In conclusion, a systematic approach to peer reviewing is possible and recommended, and can help you getting started to provide quality peer reviews that contribute to moving the field of plastic surgery forward.

An Ensemble Approach to Detect Fake News Spreaders on Twitter

  • Sarwar, Muhammad Nabeel;UlAmin, Riaz;Jabeen, Sidra
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.294-302
    • /
    • 2022
  • Detection of fake news is a complex and a challenging task. Generation of fake news is very hard to stop, only steps to control its circulation may help in minimizing its impacts. Humans tend to believe in misleading false information. Researcher started with social media sites to categorize in terms of real or fake news. False information misleads any individual or an organization that may cause of big failure and any financial loss. Automatic system for detection of false information circulating on social media is an emerging area of research. It is gaining attention of both industry and academia since US presidential elections 2016. Fake news has negative and severe effects on individuals and organizations elongating its hostile effects on the society. Prediction of fake news in timely manner is important. This research focuses on detection of fake news spreaders. In this context, overall, 6 models are developed during this research, trained and tested with dataset of PAN 2020. Four approaches N-gram based; user statistics-based models are trained with different values of hyper parameters. Extensive grid search with cross validation is applied in each machine learning model. In N-gram based models, out of numerous machine learning models this research focused on better results yielding algorithms, assessed by deep reading of state-of-the-art related work in the field. For better accuracy, author aimed at developing models using Random Forest, Logistic Regression, SVM, and XGBoost. All four machine learning algorithms were trained with cross validated grid search hyper parameters. Advantages of this research over previous work is user statistics-based model and then ensemble learning model. Which were designed in a way to help classifying Twitter users as fake news spreader or not with highest reliability. User statistical model used 17 features, on the basis of which it categorized a Twitter user as malicious. New dataset based on predictions of machine learning models was constructed. And then Three techniques of simple mean, logistic regression and random forest in combination with ensemble model is applied. Logistic regression combined in ensemble model gave best training and testing results, achieving an accuracy of 72%.

OHDSI OMOP-CDM Database Security Weakness and Countermeasures (OHDSI OMOP-CDM 데이터베이스 보안 취약점 및 대응방안)

  • Lee, Kyung-Hwan;Jang, Seong-Yong
    • Journal of Information Technology Services
    • /
    • v.21 no.4
    • /
    • pp.63-74
    • /
    • 2022
  • Globally researchers at medical institutions are actively sharing COHORT data of patients to develop vaccines and treatments to overcome the COVID-19 crisis. OMOP-CDM, a common data model that efficiently shares medical data research independently operated by individual medical institutions has patient personal information (e.g. PII, PHI). Although PII and PHI are managed and shared indistinguishably through de-identification or anonymization in medical institutions they could not be guaranteed at 100% by complete de-identification and anonymization. For this reason the security of the OMOP-CDM database is important but there is no detailed and specific OMOP-CDM security inspection tool so risk mitigation measures are being taken with a general security inspection tool. This study intends to study and present a model for implementing a tool to check the security vulnerability of OMOP-CDM by analyzing the security guidelines for the US database and security controls of the personal information protection of the NIST. Additionally it intends to verify the implementation feasibility by real field demonstration in an actual 3 hospitals environment. As a result of checking the security status of the test server and the CDM database of the three hospitals in operation, most of the database audit and encryption functions were found to be insufficient. Based on these inspection results it was applied to the optimization study of the complex and time-consuming CDM CSF developed in the "Development of Security Framework Required for CDM-based Distributed Research" task of the Korea Health Industry Promotion Agency. According to several recent newspaper articles, Ramsomware attacks on financially large hospitals are intensifying. Organizations that are currently operating or will operate CDM databases need to install database audits(proofing) and encryption (data protection) that are not provided by the OMOP-CDM database template to prevent attackers from compromising.

The Development of Inspection Checklist for Risk Recognition to Prevent Accidents at Worksites (작업현장 사고예방을 위한 위험인지 점검체크리스트 개발)

  • Lim, Hyung-Duk;Kawshalya, Mailan Arachchige Don Rajitha;Kim, Sang-Hoon;Oh, Young-Chan;Lee, Ho-Yong;Nam, Ki-Hoon
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.25 no.5
    • /
    • pp.811-816
    • /
    • 2022
  • Even though continuous management and supervision of reinforcement of policies to safeguard accidents at workplace and work sites were implemented. Accident prevention activities such as inspection and diagnosis are urgently required to induce a preliminary investigation to identify the risk factors for each type of work, before the work task to eliminate risks at the worksites. Since safety inspections at work sites were generally conducted through visual inspections, the results of safety inspections may vary depending on the findings and proficiency of the safety officers. The results of those inspections may have loopholes to prevent potential accidents at work. Therefore, the purpose of this study was to develop a risk identification checklist that can effectively perform safety inspections to prevent accidents at work sites. This study initially analyzed the previously developed accident checklist to identify current complications and issues in safety checklists. Based on the findings of major industrial accidents over the past three years, the relationship between accident, workplace, and work type were analyzed refereeing the safety inspection standards. A risk recognition-checklist was developed to provide basic data on identifying risk factors, and inspection guidance at work sites. To prepare for potential accidents by identifying and taking countermeasures to mitigate the high risk and serious accidents at sites by the guidelines of the checklist. The developed inspection checklist has been practically used by experts at work sites to perform safety inspections, and it has been verified its suitability, and feasibility, to prevent or mitigate workplace accidents, including securing the safety and health of field workers. The role of the developed safety checklist has been considered effective at worksites.

Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)

  • Sathya, V.;Kannan, Dr. S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1224-1248
    • /
    • 2022
  • In various sensor network applications, such as climate observation organizations, sensor nodes need to collect information from time to time and pass it on to the recipient of information through multiple bounces. According to field tests, this information corresponds to most of the energy use of the sensor hub. Decreasing the measurement of information transmission in sensor networks becomes an important issue.Compression sensing (CS) can reduce the amount of information delivered to the network and reduce traffic load. However, the total number of classification of information delivered using pure CS is still enormous. The hybrid technique for utilizing CS was proposed to diminish the quantity of transmissions in sensor networks.Further the energy productivity is a test task for the sensor nodes. However, in previous studies, a clustering approach using hybrid CS for a sensor network and an explanatory model was used to investigate the relationship between beam size and number of transmissions of hybrid CS technology. It uses efficient data integration techniques for large networks, but leads to clone attacks or attacks. Here, a new algorithm called SBEA (Snowball Endurance Algorithm) was proposed and tested with a bow. Thus, you can extend the battery life of your WSN by running effective copy detection. Often, multiple nodes, called observers, are selected to verify the reliability of the nodes within the network. Personal data from the source centre (e.g. personality and geographical data) is provided to the observer at the optional witness stage. The trust and reputation system is used to find the reliability of data aggregation across the cluster head and cluster nodes. It is also possible to obtain a mechanism to perform sleep and standby procedures to improve the life of the sensor node. The sniffers have been implemented to monitor the energy of the sensor nodes periodically in the sink. The proposed algorithm SBEA (Snowball Endurance Algorithm) is a combination of ERCD protocol and a combined mobility and routing algorithm that can identify the cluster head and adjacent cluster head nodes.This algorithm is used to yield the network life time and the performance of the sensor nodes can be increased.

Machine Learning Algorithm Accuracy for Code-Switching Analytics in Detecting Mood

  • Latib, Latifah Abd;Subramaniam, Hema;Ramli, Siti Khadijah;Ali, Affezah;Yulia, Astri;Shahdan, Tengku Shahrom Tengku;Zulkefly, Nor Sheereen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.334-342
    • /
    • 2022
  • Nowadays, as we can notice on social media, most users choose to use more than one language in their online postings. Thus, social media analytics needs reviewing as code-switching analytics instead of traditional analytics. This paper aims to present evidence comparable to the accuracy of code-switching analytics techniques in analysing the mood state of social media users. We conducted a systematic literature review (SLR) to study the social media analytics that examined the effectiveness of code-switching analytics techniques. One primary question and three sub-questions have been raised for this purpose. The study investigates the computational models used to detect and measures emotional well-being. The study primarily focuses on online postings text, including the extended text analysis, analysing and predicting using past experiences, and classifying the mood upon analysis. We used thirty-two (32) papers for our evidence synthesis and identified four main task classifications that can be used potentially in code-switching analytics. The tasks include determining analytics algorithms, classification techniques, mood classes, and analytics flow. Results showed that CNN-BiLSTM was the machine learning algorithm that affected code-switching analytics accuracy the most with 83.21%. In addition, the analytics accuracy when using the code-mixing emotion corpus could enhance by about 20% compared to when performing with one language. Our meta-analyses showed that code-mixing emotion corpus was effective in improving the mood analytics accuracy level. This SLR result has pointed to two apparent gaps in the research field: i) lack of studies that focus on Malay-English code-mixing analytics and ii) lack of studies investigating various mood classes via the code-mixing approach.

A Case Study: Design and Develop e-Learning Content for Korean Local Government Officials in the Pandemic

  • Park, Eunhye;Park, Sehyeon;Ryu, JaeYoul
    • International Journal of Contents
    • /
    • v.18 no.2
    • /
    • pp.47-57
    • /
    • 2022
  • e-Learning content can be defined as digital content to achieve educational goals. Since it is an educational material that can be distributed in offline, online, and mobile environments, it is important to create content that meets the learner's education environment and educational goals. In particular, if the learner is a public official, the vision, philosophy, and characteristics of each local government must reflect. As non-face-to-face online education expands further due to the COVID-19 pandemic, local governments that have relied on onsite education in the past urgently require developing strong basic competency education and special task competency content that reflect regional characteristics. Such e-learning content, however, hardly exists and the ability to independently develop them is also insufficient. In this circumstance, this case study describes the process of self-production of e-learning content suitable for Busan's characteristics by the Human Resource Development (HRD) Institute of Busan City, a local government. The field of instructional design and instructional technology is always evolving and growing by blending technological innovation into instructional platform design and adapting to the changes in society. Busan HRD Institute (BHI), therefore, tried to implement blended learning by developing content that reflected the recent trend of micro-learning in e-learning through a detailed analysis. For this, an e-learning content developer with certain requirements was selected and contracted, and the process of developing content through a collaboration between the client and developer was described in this study according to the ADDIE model of Instructional Systems Development (ISD).