• Title/Summary/Keyword: User Classification

Search Result 836, Processing Time 0.027 seconds

Knowledge Based Recommender System for Disease Diagnostic and Treatment Using Adaptive Fuzzy-Blocks

  • Navin K.;Mukesh Krishnan M. B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.284-310
    • /
    • 2024
  • Identifying clinical pathways for disease diagnosis and treatment process recommendations are seriously decision-intensive tasks for health care practitioners. It requires them to rely on their expertise and experience to analyze various categories of health parameters from a health record to arrive at a decision in order to provide an accurate diagnosis and treatment recommendations to the end user (patient). Technological adaptation in the area of medical diagnosis using AI is dispensable; using expert systems to assist health care practitioners in decision-making is becoming increasingly popular. Our work architects a novel knowledge-based recommender system model, an expert system that can bring adaptability and transparency in usage, provide in-depth analysis of a patient's medical record, and prescribe diagnostic results and treatment process recommendations to them. The proposed system uses a set of parallel discrete fuzzy rule-based classifier systems, with each of them providing recommended sub-outcomes of discrete medical conditions. A novel knowledge-based combiner unit extracts significant relationships between the sub-outcomes of discrete fuzzy rule-based classifier systems to provide holistic outcomes and solutions for clinical decision support. The work establishes a model to address disease diagnosis and treatment recommendations for primary lung disease issues. In this paper, we provide some samples to demonstrate the usage of the system, and the results from the system show excellent correlation with expert assessments.

Sentiment Analysis on 'HelloTalk' App Reviews Using NRC Emotion Lexicon and GoEmotions Dataset

  • Simay Akar;Yang Sok Kim;Mi Jin Noh
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.35-43
    • /
    • 2024
  • During the post-pandemic period, the interest in foreign language learning surged, leading to increased usage of language-learning apps. With the rising demand for these apps, analyzing app reviews becomes essential, as they provide valuable insights into user experiences and suggestions for improvement. This research focuses on extracting insights into users' opinions, sentiments, and overall satisfaction from reviews of HelloTalk, one of the most renowned language-learning apps. We employed topic modeling and emotion analysis approaches to analyze reviews collected from the Google Play Store. Several experiments were conducted to evaluate the performance of sentiment classification models with different settings. In addition, we identified dominant emotions and topics within the app reviews using feature importance analysis. The experimental results show that the Random Forest model with topics and emotions outperforms other approaches in accuracy, recall, and F1 score. The findings reveal that topics emphasizing language learning and community interactions, as well as the use of language learning tools and the learning experience, are prominent. Moreover, the emotions of 'admiration' and 'annoyance' emerge as significant factors across all models. This research highlights that incorporating emotion scores into the model and utilizing a broader range of emotion labels enhances model performance.

Applying Academic Theory with Text Mining to Offer Business Insight: Illustration of Evaluating Hotel Service Quality

  • Choong C. Lee;Kun Kim;Haejung Yun
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.615-643
    • /
    • 2019
  • Now is the time for IS scholars to demonstrate the added value of academic theory through its integration with text mining, clearly outline how to implement this for text mining experts outside of the academic field, and move towards establishing this integration as a standard practice. Therefore, in this study we develop a systematic theory-based text-mining framework (TTMF), and illustrate the use and benefits of TTMF by conducting a text-mining project in an actual business case evaluating and improving hotel service quality using a large volume of actual user-generated reviews. A total of 61,304 sentences extracted from actual customer reviews were successfully allocated to SERVQUAL dimensions, and the pragmatic validity of our model was tested by the OLS regression analysis results between the sentiment scores of each SERVQUAL dimension and customer satisfaction (star rates), and showed significant relationships. As a post-hoc analysis, the results of the co-occurrence analysis to define the root causes of positive and negative service quality perceptions and provide action plans to implement improvements were reported.

Enhancing Speech Recognition with Whisper-tiny Model: A Scalable Keyword Spotting Approach (Whisper-tiny 모델을 활용한 음성 분류 개선: 확장 가능한 키워드 스팟팅 접근법)

  • Shivani Sanjay Kolekar;Hyeonseok Jin;Kyungbaek Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.774-776
    • /
    • 2024
  • The effective implementation of advanced speech recognition (ASR) systems necessitates the deployment of sophisticated keyword spotting models that are both responsive and resource-efficient. The initial local detection of user interactions is crucial as it allows for the selective transmission of audio data to cloud services, thereby reducing operational costs and mitigating privacy risks associated with continuous data streaming. In this paper, we address these needs and propose utilizing the Whisper-Tiny model with fine-tuning process to specifically recognize keywords from google speech dataset which includes 65000 audio clips of keyword commands. By adapting the model's encoder and appending a lightweight classification head, we ensure that it operates within the limited resource constraints of local devices. The proposed model achieves the notable test accuracy of 92.94%. This architecture demonstrates the efficiency as on-device model with stringent resources leading to enhanced accessibility in everyday speech recognition applications.

Real time instruction classification system

  • Sang-Hoon Lee;Dong-Jin Kwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.212-220
    • /
    • 2024
  • A recently the advancement of society, AI technology has made significant strides, especially in the fields of computer vision and voice recognition. This study introduces a system that leverages these technologies to recognize users through a camera and relay commands within a vehicle based on voice commands. The system uses the YOLO (You Only Look Once) machine learning algorithm, widely used for object and entity recognition, to identify specific users. For voice command recognition, a machine learning model based on spectrogram voice analysis is employed to identify specific commands. This design aims to enhance security and convenience by preventing unauthorized access to vehicles and IoT devices by anyone other than registered users. We converts camera input data into YOLO system inputs to determine if it is a person, Additionally, it collects voice data through a microphone embedded in the device or computer, converting it into time-domain spectrogram data to be used as input for the voice recognition machine learning system. The input camera image data and voice data undergo inference tasks through pre-trained models, enabling the recognition of simple commands within a limited space based on the inference results. This study demonstrates the feasibility of constructing a device management system within a confined space that enhances security and user convenience through a simple real-time system model. Finally our work aims to provide practical solutions in various application fields, such as smart homes and autonomous vehicles.

IFC Property Set-based Approach for Generating Semantic Information of Steel Box Girder Bridge Components (IFC Property Set을 활용한 강박스교 구성요소의 의미정보 생성)

  • Lee, Sang-Ho;Park, Sang Il;Park, Kun-Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.2
    • /
    • pp.687-697
    • /
    • 2014
  • This study ranges from planning phase to the detailed design phase of steel box girder bridge and proposes ways to generate semantic information of components through Industry Foundation Classes (IFC), a data model for Building Information Modeling (BIM). The classification of components of steel box girder bridge was performed to define information items required for identifying semantic information based on IFC, and spatial information items based on topology and physical information items based on functions of components were classified to create additional properties that does not support IFC by applying user-defined property set within the IFC framework. Steel box girder bridge information model based on IFC was implemented through BIM software and semantic information input interface, which was developed in this study to examine the effectiveness of the additionally created user-defined property. Furthermore, the quantity take-off of components was performed through information model of steel box girder bridge, and the applicability of the proposed method was tested by comparing the quantity take-off based on design document with the result.

Correlation between alcohol use and juvenile criminal behavior patterns in Korea

  • Kim, Hyun-Sil
    • Journal of Korean Academy of Nursing
    • /
    • v.29 no.5
    • /
    • pp.1134-1146
    • /
    • 1999
  • The purpose of this study was to examine the correlation between Juvenile alcohol use and their criminal patterns. The data were collected through questionnaire surveys. Subjects serving for this study were 971 delinquent adolescents in Korea, sampled from 6 juvenile corrective institutions and 2 classification judging institutions, using a census method. Their age range was between 12 and 21. Data were analysed by IBM PC using SAS program. Statistical methods employed were Chi-square and frequency analysis. 1. Of 877 respondents, the number of adolescents committed criminal behaviors while the intoxicated were 230(26.2%), and 647(73.8%) were in a non-intoxicated state. 2. Adolescent under intoxication showed a higher rate of aggressive crimes and assault crimes, whereas adolescents under the non-influence of liquor tended to commit property climes and violations of criminal special law Drunken state adolescents during committing criminal behaviors used knifes, stones or fist-kicking as criminal tools, whereas drug use or without weapons in non drunken state. Most crimes have happened without any tools in both group. 3. In comparison of the alcohol user and the non-user, most alcohol-related crimes among adolescents were committed at AM 0:00 to AM 4:00 during the weekend in the dark, cloudy, and stormy-rainy day, while non-alcohol related crimes were at afternoon of weekday in the clear day. The places that the criminal activities occurred were streets, amusement places such as disco-theque, fields and their own house among alcohol users, whereas victim's house, another person's house and restaurant were chosen among non-alcohol users. 4. The victims assaulted by Juvenile offenders in both drunken and non-drunken state were mostly passer-by(65.4%), followed by their friends(25.1%). And the conditions of victims showed a significant differences between the drunken adolescents and the non-drunken adolescents. The victim's conditions assaulted by intoxicated delinquent adolescents were in quarreling or drunken state, whereas non-alcohol related crimes were directed against victims in a sleeping or irresistible state. 5. Almost over the half of delinquent adolescents perceived their delinquency as wrong behaviors. and alcohol non-user tended to more significantly perceive their criminal acts as wrong conducts. About the half of respondents answered that they committed their criminal acts in spite of having a very good Judgement while doing crimes, the author did not found a significant difference between the two groups. The reasons given for crimes were manifested as follows: it can be seen that ‘to get money for amusements’(30.4 % of all motives) were most common, followed by ‘to commit accidentally the offences’(23.8%), ‘curiosity or heroism’(18.9%). alcohol related crimes tended to be accidental and impulsively without any clear planning, while non-alcohol related crimes tended to be purposeful, directed to make money motivated by curiosity or a desire to live heroically. In Conclusions. the correlation between alcohol use and Juvenile criminal behaviors has been examined in this study. Generally, alcohol use had been found to be highly correlated with aggressive assault crimes including robbery, burglary and rape etc.

  • PDF

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

Fast information extraction algorithm for object-based MPEG-4 application from MPEG-2 bit-streamaper (MPEG-2 비트열로부터 객체 기반 MPEG-4 응용을 위한 고속 정보 추출 알고리즘)

  • 양종호;원치선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12A
    • /
    • pp.2109-2119
    • /
    • 2001
  • In this paper, a fast information extraction algorithm for object-based MPEG-4 application from MPEG-2 bit-steam is proposed. For object-based MPEG-4 conversion, we need to extract such information as object-image, shape-image, macro-block motion vector, and header information from MPEG-2 bit-stream. If we use the extracted information, fast conversion for object-based MPEG-4 is possible. The proposed object extraction algorithm has two important steps, namely the motion vectors extraction from MPEG-2 bit-stream and the watershed algorithm. The algorithm extracts objects using user\`s assistance in the intra frame and tracks then in the following inter frames. If we have an unsatisfactory result for a fast moving object, the user can intervene to correct the segmentation. The proposed algorithm consist of two steps, which are intra frame object extracts processing and inter frame tracking processing. Object extracting process is the step in which user extracts a semantic object directly by using the block classification and watersheds. Object tacking process is the step of the following the object in the subsequent frames. It is based on the boundary fitting method using motion vector, object-mask, and modified watersheds. Experimental results show that the proposed method can achieve a fast conversion from the MPEG-2 bit-stream to the object-based MPEG-4 input.

  • PDF

Fast information extraction algorithm for object-based MPEG-4 conversion from MPEG-1,2 (MPEG-1,2로부터 객체 기반 MPEG-4 변환을 위한 고속 정보 추출 알고리즘)

  • 양종호;박성욱
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.91-102
    • /
    • 2004
  • In this paper, a fast information extraction algorithm for object-based MPEG-4 application from MPEG-1,2 is proposed. For object-based MPEG-4 conversion, we need to extract such information as object-image, shape-image, macro-block motion vector, and header information from MPEG-1,2 bit-stream. If we use the extracted information, fast conversion for object-based MPEG-4 is possible. The proposed object extraction algerian has two important steps, namely the motion vector extraction from MPEG-1,2 bit-stream and the watershed algerian The algorithm extracts objects using user's assistance in the intra frame and tracks then in the following inter frames. If we have an unsatisfactory result for a fast moving object the user can intervene to connect the segmentation. The proposed algorithm consist of two steps, which are intra frame object extracting processing and inter frame tracking processing. Object extracting process is the step in which user extracts a semantic object directly by using the block classification and watersheds. Object tracking process is the step of the following the object in the subsequent frames. It is based on the boundary fitting method using motion vector, object-mask and modified watersheds. Experimental results show that the proposed method can achieve a fast conversion from the MPEG-1,2 bit-stream to the object-based MPEG-4 input.