• Title/Summary/Keyword: behavior selection network

Search Result 73, Processing Time 0.032 seconds

Decision making for Shipping Network based on Adaptive Cumulative Prospect Theory

  • Pham Thi Yen;Nguyen Phung Hung;Truong Ngoc Cuong;Hwan-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.256-257
    • /
    • 2023
  • This paper aims to propose optimal method to assess and cumulate the daily profit for liner shipping to support the shipping lines in making optimal decision with the highest average daily profit. This paper not only explains the actual calculated results align with decision-makers' behavior from concepts indicated in cumulative prospect theory but also contributes to an easy-to-apply method for liner shipping network predictability in and provides optimal decision-making is helpful for shipping managers for the best effective selection of the most appropriate alternative under uncertainties.

  • PDF

Free vibration analysis of FGM plates using an optimization methodology combining artificial neural networks and third order shear deformation theory

  • Mohamed Janane Allah;Saad Hassouna;Rachid Aitbelale;Abdelaziz Timesli
    • Steel and Composite Structures
    • /
    • v.49 no.6
    • /
    • pp.633-643
    • /
    • 2023
  • In this study, the natural frequencies of Functional Graded Materials (FGM) plates are predicted using Artificial Neural Network (ANN). A model based on Third-order Shear Deformation Theory (TSDT) and FEM is used to train the ANN model. Different training methods are tested to simulate input and output dependency. As this is a parametric model, several architectures and optimization algorithms were tested. The proposed model allows us to minimize the CPU time to evaluate candidate material properties for FGM plate material selection and demonstrate their influence on dynamic behavior. Consequently, the time required for the FGM design process (candidate materials for material selection) and the geometric optimization of the FGM structure would remain reasonable. The ANN model can help industries to produce FGM plates with good mechanical properties of the selected materials. I addition, this model can be used to directly predict vibration behavior by testing a large number of FGM plates, representing all possible combinations of metals and ceramics in today's industry, without having to solve any eigenvalue problems.

Analysis of the Price-Selection Problem in Priority-based Scheduling (우선순위 방식 스케쥴링에서의 가격선택 문제의 분석)

  • Park, Sun-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.183-192
    • /
    • 2006
  • This paper analyzes the price-selection problem under priority-based scheduling for QoS (Quality of Service) network services, i.e., how to determine the price associated with each service level. In particular, we focus on the problems with the pricing mechanism based on equilibrium analysis. We claim that the assumptions needed to produce equilibrium nay not hold in some important environments. Specifically, (a) the individual user's impact on the system is not infinitesimal and (b) users do not always have up-to-date global system-status knowledge crucial for optimal user decisions required for equilibrium. These may make the equilibrium models inaccurate in realistic environments. We examine the accuracy of some existing equilibrium methods by using a dynamic model that we have developed for system behavior analysis. The analysis indicates that equilibrium methods fail to model accurately the system behavior in some realistic environments.

The Method of Feature Selection for Anomaly Detection in Bitcoin Network Transaction (비트코인 네트워크 트랜잭션 이상 탐지를 위한 특징 선택 방법)

  • Baek, Ui-Jun;Shin, Mu-Gon;Jee, Se-Hyun;Park, Jee-Tae;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.18-25
    • /
    • 2018
  • Since the development of block-chain technology by Satoshi Nakamoto and Bitcoin pioneered a new cryptocurrency market, a number of scale of cryptocurrency have emerged. There are crimes taking place using the anonymity and vulnerabilities of block-chain technology, and many studies are underway to improve vulnerability and prevent crime. However, they are not enough to detect users who commit crimes. Therefore, it is very important to detect abnormal behavior such as money laundering and stealing cryptocurrency from the network. In this paper, the characteristics of the transactions and user graphs in the Bitcoin network are collected and statistical information is extracted from them and presented as plots on the log scale. Finally, we analyze visualized plots according to the Densification Power Law and Power Law Degree, as a result, present features appropriate for detection of anomalies involving abnormal transactions and abnormal users in the Bitcoin network.

Hybrid Learning-Based Cell Morphology Profiling Framework for Classifying Cancer Heterogeneity (암의 이질성 분류를 위한 하이브리드 학습 기반 세포 형태 프로파일링 기법)

  • Min, Chanhong;Jeong, Hyuntae;Yang, Sejung;Shin, Jennifer Hyunjong
    • Journal of Biomedical Engineering Research
    • /
    • v.42 no.5
    • /
    • pp.232-240
    • /
    • 2021
  • Heterogeneity in cancer is the major obstacle for precision medicine and has become a critical issue in the field of a cancer diagnosis. Many attempts were made to disentangle the complexity by molecular classification. However, multi-dimensional information from dynamic responses of cancer poses fundamental limitations on biomolecular marker-based conventional approaches. Cell morphology, which reflects the physiological state of the cell, can be used to track the temporal behavior of cancer cells conveniently. Here, we first present a hybrid learning-based platform that extracts cell morphology in a time-dependent manner using a deep convolutional neural network to incorporate multivariate data. Feature selection from more than 200 morphological features is conducted, which filters out less significant variables to enhance interpretation. Our platform then performs unsupervised clustering to unveil dynamic behavior patterns hidden from a high-dimensional dataset. As a result, we visualize morphology state-space by two-dimensional embedding as well as representative morphology clusters and trajectories. This cell morphology profiling strategy by hybrid learning enables simplification of the heterogeneous population of cancer.

Behavioral motivation-based Action Selection Mechanism with Bayesian Affordance Models (베이지안 행동유발성 모델을 이용한 행동동기 기반 행동 선택 메커니즘)

  • Lee, Sang-Hyoung;Suh, Il-Hong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.4
    • /
    • pp.7-16
    • /
    • 2009
  • A robot must be able to generate various skills to achieve given tasks intelligently and reasonably. The robot must first learn affordances to generate the skills. An affordance is defined as qualities of objects or environments that induce actions. Affordances can be usefully used to generate skills. Most tasks require sequential and goal-oriented behaviors. However, it is usually difficult to accomplish such tasks with affordances alone. To accomplish such tasks, a skill is constructed with an affordance and a soft behavioral motivation switch for reflecting goal-oriented elements. A skill calculates a behavioral motivation as a combination of both presently perceived information and goal-oriented elements. Here, a behavioral motivation is the internal condition that activates a goal-oriented behavior. In addition, a robot must be able to execute sequential behaviors. We construct skill networks by using generated skills that make action selection feasible to accomplish a task. A robot can select sequential and a goal-oriented behaviors using the skill network. For this, we will first propose a method for modeling and learning Bayesian networks that are used to generate affordances. To select sequential and goal-oriented behaviors, we construct skills using affordances and soft behavioral motivation switches. We also propose a method to generate the skill networks using the skills to execute given tasks. Finally, we will propose action-selection-mechanism to select sequential and goal-oriented behaviors using the skill network. To demonstrate the validity of our proposed methods, "Searching-for-a-target-object", "Approaching-a-target-object", "Sniffing-a-target-object", and "Kicking-a-target-object" affordances have been learned with GENIBO (pet robot) based on the human teaching method. Some experiments have also been performed with GENIBO using the skills and the skill networks.

Survey on IEEE 802.11 DCF Game Theoretic Approaches (IEEE 802.11 DCF에서의 게임 이론적 접근방법 소개)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryu, Jae-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.240-242
    • /
    • 2007
  • The game theoretic analysis in wireless networks can be classified into the jamming game of the physical layer, the multiple access game of the medium access layer, the forwarder's dilemma and joint packet forwarding game of the network layer, and etc. In this paper, the game theoretic analysis about the multiple access game that selfish nodes exist in the IEEE 802.11 DCF(Distributed Coordination Function) wireless networks is addressed. In this' wireless networks, the modeling of the CSMA/CA protocol based DCF, the utility or payoff function calculation of the game, the system optimization (using optimization theory or convex optimization), and selection of Pareto-optimality and Nash Equilibrium in game strategies are the important elements for analyzing how nodes are operated in the steady state of system. Finally, the main issues about the game theory in the wireless network are introduced.

  • PDF

The Impact of Transforming Unstructured Data into Structured Data on a Churn Prediction Model for Loan Customers

  • Jung, Hoon;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4706-4724
    • /
    • 2020
  • With various structured data, such as the company size, loan balance, and savings accounts, the voice of customer (VOC), which is text data containing contact history and counseling details was analyzed in this study. To analyze unstructured data, the term frequency-inverse document frequency (TF-IDF) analysis, semantic network analysis, sentiment analysis, and a convolutional neural network (CNN) were implemented. A performance comparison of the models revealed that the predictive model using the CNN provided the best performance with regard to predictive power, followed by the model using the TF-IDF, and then the model using semantic network analysis. In particular, a character-level CNN and a word-level CNN were developed separately, and the character-level CNN exhibited better performance, according to an analysis for the Korean language. Moreover, a systematic selection model for optimal text mining techniques was proposed, suggesting which analytical technique is appropriate for analyzing text data depending on the context. This study also provides evidence that the results of previous studies, indicating that individual customers leave when their loyalty and switching cost are low, are also applicable to corporate customers and suggests that VOC data indicating customers' needs are very effective for predicting their behavior.

Research trends in the Korean Journal of Women Health Nursing from 2011 to 2021: a quantitative content analysis

  • Ju-Hee Nho;Sookkyoung Park
    • Women's Health Nursing
    • /
    • v.29 no.2
    • /
    • pp.128-136
    • /
    • 2023
  • Purpose: Topic modeling is a text mining technique that extracts concepts from textual data and uncovers semantic structures and potential knowledge frameworks within context. This study aimed to identify major keywords and network structures for each major topic to discern research trends in women's health nursing published in the Korean Journal of Women Health Nursing (KJWHN) using text network analysis and topic modeling. Methods: The study targeted papers with English abstracts among 373 articles published in KJWHN from January 2011 to December 2021. Text network analysis and topic modeling were employed, and the analysis consisted of five steps: (1) data collection, (2) word extraction and refinement, (3) extraction of keywords and creation of networks, (4) network centrality analysis and key topic selection, and (5) topic modeling. Results: Six major keywords, each corresponding to a topic, were extracted through topic modeling analysis: "gynecologic neoplasms," "menopausal health," "health behavior," "infertility," "women's health in transition," and "nursing education for women." Conclusion: The latent topics from the target studies primarily focused on the health of women across all age groups. Research related to women's health is evolving with changing times and warrants further progress in the future. Future research on women's health nursing should explore various topics that reflect changes in social trends, and research methods should be diversified accordingly.

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.