• Title/Summary/Keyword: Online Performance

Search Result 1,256, Processing Time 0.033 seconds

AraProdMatch: A Machine Learning Approach for Product Matching in E-Commerce

  • Alabdullatif, Aisha;Aloud, Monira
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.214-222
    • /
    • 2021
  • Recently, the growth of e-commerce in Saudi Arabia has been exponential, bringing new remarkable challenges. A naive approach for product matching and categorization is needed to help consumers choose the right store to purchase a product. This paper presents a machine learning approach for product matching that combines deep learning techniques with standard artificial neural networks (ANNs). Existing methods focused on product matching, whereas our model compares products based on unstructured descriptions. We evaluated our electronics dataset model from three business-to-consumer (B2C) online stores by putting the match products collectively in one dataset. The performance evaluation based on k-mean classifier prediction from three real-world online stores demonstrates that the proposed algorithm outperforms the benchmarked approach by 80% on average F1-measure.

Enhanced and applicable algorithm for Big-Data by Combining Sparse Auto-Encoder and Load-Balancing, ProGReGA-KF

  • Kim, Hyunah;Kim, Chayoung
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.218-223
    • /
    • 2021
  • Pervasive enhancement and required enforcement of the Internet of Things (IoTs) in a distributed massively multiplayer online architecture have effected in massive growth of Big-Data in terms of server over-load. There have been some previous works to overcome the overloading of server works. However, there are lack of considered methods, which is commonly applicable. Therefore, we propose a combing Sparse Auto-Encoder and Load-Balancing, which is ProGReGA for Big-Data of server loads. In the process of Sparse Auto-Encoder, when it comes to selection of the feature-pattern, the less relevant feature-pattern could be eliminated from Big-Data. In relation to Load-Balancing, the alleviated degradation of ProGReGA can take advantage of the less redundant feature-pattern. That means the most relevant of Big-Data representation can work. In the performance evaluation, we can find that the proposed method have become more approachable and stable.

Detecting Anomalous Trajectories of Workers using Density Method

  • Lan, Doi Thi;Yoon, Seokhoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.109-118
    • /
    • 2022
  • Workers' anomalous trajectories allow us to detect emergency situations in the workplace, such as accidents of workers, security threats, and fire. In this work, we develop a scheme to detect abnormal trajectories of workers using the edit distance on real sequence (EDR) and density method. Our anomaly detection scheme consists of two phases: offline phase and online phase. In the offline phase, we design a method to determine the algorithm parameters: distance threshold and density threshold using accumulated trajectories. In the online phase, an input trajectory is detected as normal or abnormal. To achieve this objective, neighbor density of the input trajectory is calculated using the distance threshold. Then, the input trajectory is marked as an anomaly if its density is less than the density threshold. We also evaluate performance of the proposed scheme based on the MIT Badge dataset in this work. The experimental results show that over 80 % of anomalous trajectories are detected with a precision of about 70 %, and F1-score achieves 74.68 %.

Online Sonobuoy Deployment Method with Bayesian Optimization for Estimating Location of Submarines (잠수함 위치 추정을 위한 베이지안 최적화 기반의 온라인 소노부이 배치 기법)

  • Kim, Dooyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.1
    • /
    • pp.72-81
    • /
    • 2022
  • Maritime patrol aircraft is an efficient solution for detecting submarines at sea. The aircraft can only detect submarines by sonobuoy, but the number of buoy is limited. In this paper, we present the online sonobuoy deployment method for estimating the location of submarines. We use Gaussian process regression to estimate the submarine existence probability map, and Bayesian optimization to decide the next best position of sonobuoy. Further, we show the performance of the proposed method by simulation.

A Study on Trends Related to Boryeong Mud Festival Using Tourism Big Data Analysis (관광 빅데이터 분석을 활용한 보령머드축제 관련 동향 탐색 연구)

  • Han Jangheon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.165-175
    • /
    • 2023
  • Boryeong Mud Festival has become a representative local festival that both domestic and foreign tourists can enjoy together. In addition, it is one of the usual hands-on marine festivals in Korea that can be enjoyed with one mind at the Boryeong Mud Festival, regardless of race, age, and language. This study explored the overall perception and trends of the Boryeong Mud Festival using big data extracted online from the Boryeong Mud Festival. First, keywords such as Chungnam, hosting, summer, reporter, experience, opening ceremony, performance, operation, news, tourist, opening, event, and festival were frequently exposed online. Second, due to centrality analysis, the centrality of festival experience programs and performances, opening ceremonies, and Boryeong mayor was high. Third, due to the CONCOR analysis, five clusters of meaningful keywords related to the Boryeong Mud Festival were formed.

On-line Learning Effect Applying PBL-based PSC-Note (PBL 기반 PSC-Note를 적용한 온라인 학습 효과)

  • Kim, Hwa-seon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.453-455
    • /
    • 2021
  • Due to the prolonged Covid-19, online learning has become an essential learning, not an option. In this reality, online learning method that depends on passive video viewing have limitations of poor academic performance and low learning achievement for students. In this work, to overcome these limitations, we apply PSC-Note to the PBL teaching method to improve learners' problem-solving and self-directed learning skills and also improve learning achievement.

  • PDF

An effective online delay estimation method based on a simplified physical system model for real-time hybrid simulation

  • Wang, Zhen;Wu, Bin;Bursi, Oreste S.;Xu, Guoshan;Ding, Yong
    • Smart Structures and Systems
    • /
    • v.14 no.6
    • /
    • pp.1247-1267
    • /
    • 2014
  • Real-Time Hybrid Simulation (RTHS) is a novel approach conceived to evaluate dynamic responses of structures with parts of a structure physically tested and the remainder parts numerically modelled. In RTHS, delay estimation is often a precondition of compensation; nonetheless, system delay may vary during testing. Consequently, it is sometimes necessary to measure delay online. Along these lines, this paper proposes an online delay estimation method using least-squares algorithm based on a simplified physical system model, i.e., a pure delay multiplied by a gain reflecting amplitude errors of physical system control. Advantages and disadvantages of different delay estimation methods based on this simplified model are firstly discussed. Subsequently, it introduces the least-squares algorithm in order to render the estimator based on Taylor series more practical yet effective. As a result, relevant parameter choice results to be quite easy. Finally in order to verify performance of the proposed method, numerical simulations and RTHS with a buckling-restrained brace specimen are carried out. Relevant results show that the proposed technique is endowed with good convergence speed and accuracy, even when measurement noises and amplitude errors of actuator control are present.

Unsupervised Scheme for Reverse Social Engineering Detection in Online Social Networks (온라인 소셜 네트워크에서 역 사회공학 탐지를 위한 비지도학습 기법)

  • Oh, Hayoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.129-134
    • /
    • 2015
  • Since automatic social engineering based spam attacks induce for users to click or receive the short message service (SMS), e-mail, site address and make a relationship with an unknown friend, it is very easy for them to active in online social networks. The previous spam detection schemes only apply manual filtering of the system managers or labeling classifications regardless of the features of social networks. In this paper, we propose the spam detection metric after reflecting on a couple of features of social networks followed by analysis of real social network data set, Twitter spam. In addition, we provide the online social networks based unsupervised scheme for automated social engineering spam with self organizing map (SOM). Through the performance evaluation, we show the detection accuracy up to 90% and the possibility of real time training for the spam detection without the manager.

Developing the Purchase Conversion Model of the Keyword Advertising Based on the Individual Search (개인검색기반 키워드광고 구매전환모형 개발)

  • Lee, Dong Il;Kim, Hyun Gyo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.38 no.1
    • /
    • pp.123-138
    • /
    • 2013
  • Keyword advertising has been used as a promotion tool rather than the advertising itself to online retailers. This is because the online retailer expects the direct sales increase when they deploy the keyword sponsorship. In practice, many online sellers rely on keyword advertising to promote their sales in short term with limited budget. Most of the previous researches use direct revenue factors as dependent variables such as CTR (click through rate) and CVI (conversion per impression) in their researches on the keyword advertising[14, 16, 22, 25, 31, 32]. Previous studies were, however, conducted in the context of aggregate-level due to the limitations on the data availability. These researches cannot evaluate the performance of keyword advertising in the individual level. To overcome these limitations, our research focuses on conversion of keyword advertising in individual-level. Also, we consider manageable factors as independent variables in terms of online retailers (the costs of keyword by implementation methods and meanings of keyword). In our study we developed the keyword advertising conversion model in the individual-level. With our model, we can make some theoretical findings and managerial implications. Practically, in the case of a fixed cost plan, an increase of the number of clicks is revealed as an effective way. However, higher average CPC is not significantly effective in increasing probability of purchase conversion. When this type (fixed cost plan) of implementation could not generate a lot of clicks, it cannot significantly increase the probability of purchase choice. Theoretically, we consider the promotional attributes which influence consumer purchase behavior and conduct individuals-level research based on the actual data. Limitations and future direction of the study are discussed.

Contents Recommendation Scheme Considering User Activity in Social Network Environments (소셜 네트워크 환경에서 사용자 행위를 고려한 콘텐츠 추천 기법)

  • Ko, Geonsik;Kim, Byounghoon;Kim, Daeyun;Choi, Minwoong;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.404-414
    • /
    • 2017
  • With the development of smartphones and online social networks, users produce a lot of contents and share them with each other. Therefore, users spend time by viewing or receiving the contents they do not want. In order to solve such problems, schemes for recommending useful contents have been actively studied. In this paper, we propose a contents recommendation scheme using collaborative filtering for users on online social networks. The proposed scheme consider a user trust in order to remove user data that lower the accuracy of recommendation. The user trust is derived by analyzing the user activity of online social network. For evaluating the user trust from various points of view, we collect user activities that have not been used in conventional techniques. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.