• Title/Summary/Keyword: computer analysis

Search Result 18,415, Processing Time 0.045 seconds

Sentiment Analysis BERT Models Challenge (좌충우돌 감성분석 BERT 미세조정 분석)

  • Park, Jung-Won;Mo, Hyun-Su;Kim, Jeong-Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.13-15
    • /
    • 2021
  • 텍스트에 나타나는 감성을 분석하는 NLP task 중 하나인 감성분석에 자주 사용되는 한국어와 외국어 데이터들에 대해 다양한 BERT 모델들을 적용한 결과를 고성능 순서로 정리한 사이트(Paper with code)와 Github를 통해 준수한 성능을 보이는 BERT 모델들을 분석하고 실행해보며 성능향상을 통한 차별성을 가지는 것이 목표이다.

  • PDF

Baseball Player Scouting Model using Big Data Analysis and Game Theory (빅데이터 분석과 게임이론을 활용한 야구선수 영입 모델)

  • Kim, Yun-Hu;Kim, Sang-Heon;Choi, Hyung-June;Jung, Jai-Eun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.321-322
    • /
    • 2018
  • 빅데이터 분석은 스포츠에서 다양한 분야에서 사용되고 있다. 야구산업에서도 세이버 메트릭스를 활용하여 전술 훈련, 개인 훈련 등 다양한 방면으로 활용되고 있다. 본 논문에서는 기존의 연구인 빅데이터 분석과 게임이론을 활용한 축구선수 영입 모델을 야구에 적용킨 시뮬레이션을 진행하고 합리적인 의사결정 모델을 제안한다.

  • PDF

Cyberbullying Detection by Sentiment Analysis of Tweets' Contents Written in Arabic in Saudi Arabia Society

  • Almutairi, Amjad Rasmi;Al-Hagery, Muhammad Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.112-119
    • /
    • 2021
  • Social media has become a global means of communication in people's lives. Most people are using Twitter for communication purposes and its inappropriate use, which has negative effects on people's lives. One of the widely common misuses of Twitter is cyberbullying. As the resources of dialectal Arabic are rare, so for cyberbullying most people are using dialectal Arabic. For this reason, the ultimate goal of this study is to detect and classify cyberbullying on Twitter in the Arabic context in Saudi Arabia. To help in the detection and classification of tweets, Pointwise Mutual Information (PMI) to generate a lexicon, and Support Vector Machine (SVM) algorithms are used. The evaluation is performed on both methods in terms of the F1-score. However, the F1-score after applying the PMI is 50%, while after the SVM application on the resampling data it is 82%. The analysis of the results shows that the SVM algorithm outperforms better.

Analysis and Modeling of Magnetic Characteristics in Surface-Mounted Permanent-Magnet Machines with Rotor Overhang

  • Yeo, Han-Kyeol;Woo, Dong-Kyun;Lim, Dong-Kuk;Ro, Jong-Suk;Jung, Hyun-Kyo
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.2 no.4
    • /
    • pp.399-404
    • /
    • 2013
  • The rotor overhang is used to enhance air-gap flux and improve power density. Due to asymmetry in the axial direction caused by the overhang, the time consuming 3D analysis is necessary to design the motor with overhang. To solve this problem, this paper proposes the equivalent magnetic circuit model (EMCM) that can consider overhang effects without the 3D analysis by using effective air-gap length. The analysis time can be reduced significantly via the proposed EMCM. The reduction of the analysis time is essential for the preliminary design of the motor. In order to verify the proposed model, the 3-D finite-element method (FEM) analysis is adopted. 3-D FEM results confirm the validity of the proposed EMCM.

Finding Naval Ship Maintenance Expertise Through Text Mining and SNA

  • Kim, Jin-Gwang;Yoon, Soung-woong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.125-133
    • /
    • 2019
  • Because military weapons systems for special purposes are small and complex, they are not easy to maintain. Therefore, it is very important to maintain combat strength through quick maintenance in the event of a breakdown. In particular, naval ships are complex weapon systems equipped with various equipment, so other equipment must be considered for maintenance in the event of equipment failure, so that skilled maintenance personnel have a great influence on rapid maintenance. Therefore, in this paper, we analyzed maintenance data of defense equipment maintenance information system through text mining and social network analysis(SNA), and tried to identify the naval ship maintenance expertise. The defense equipment maintenance information system is a system that manages military equipment efficiently. In this study, the data(2,538cases) of some naval ship maintenance teams were analyzed. In detail, we examined the contents of main maintenance and maintenance personnel through text mining(word cloud, word network). Next, social network analysis(collaboration analysis, centrality analysis) was used to confirm the collaboration relationship between maintenance personnel and maintenance expertise. Finally, we compare the results of text mining and social network analysis(SNA) to find out appropriate methods for finding and finding naval ship maintenance expertise.

Pragmatic Strategies of Self (Other) Presentation in Literary Texts: A Computational Approach

  • Khafaga, Ayman Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.223-231
    • /
    • 2022
  • The application of computer software into the linguistic analysis of texts proves useful to arrive at concise and authentic results from large data texts. Based on this assumption, this paper employs a Computer-Aided Text Analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the manipulative strategies of positive/negative presentation in Orwell's Animal Farm. More specifically, the paper attempts to explore the extent to which CATA software represented by the three variables of Frequency Distribution Analysis (FDA), Content Analysis (CA), and Key Word in Context (KWIC) incorporate with CDA decipher the manipulative purposes beyond positive presentation of selfness and negative presentation of otherness in the selected corpus. The analysis covers some CDA strategies, including justification, false statistics, and competency, for positive self-presentation; and accusation, criticism, and the use of ambiguous words for negative other-presentation. With the application of CATA, some words will be analyzed by showing their frequency distribution analysis as well as their contextual environment in the selected text to expose the extent to which they are employed as strategies of positive/negative presentation in the text under investigation. Findings show that CATA software contributes significantly to the linguistic analysis of large data texts. The paper recommends the use and application of the different CATA software in the stylistic and corpus linguistics studies.

A Study of Educational Process of architectural Computer Graphics by Job Analysis (직무분석을 통한 건축컴퓨터그래픽전공 교과과정 연구)

  • Kim, Sang-Hyun;Park, Jong-Beak
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.1 no.1
    • /
    • pp.9-15
    • /
    • 2001
  • This research is to grasp the identify the curriculum development procedure for architectural computer graphics. In order to achieve the above purpose, this study was carried out job analysis of architectural graphic designer. Architectural Computer Graphics Curriculum is developed by tasks analysis. Each characteristics are as fellow: 1. job-related knowledges are based on architectural design parts, 2. skilled workers should be made on the base of job analysis and O.J.T(On the job training) 3. trained students are related many kinds of all industry parts of Architecture & interior Especially college students have needs for design part of architecture fit on study in these curriculum.

  • PDF

Operating Condition Diagnosis of the Lubricated Machine Moving Surface by Image Analysis (화상해석에 의한 기계윤할 운동면의 작동상태 진단)

  • 박흥식
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.23 no.1
    • /
    • pp.79-87
    • /
    • 1999
  • The most part of the faculty drop a trouble and damage of machine equipment even if whatever cause they break out take place at local and trifling place and the factor dominating their trouble is due to wear debris occurred in the lubricated machine moving surface. This study has been car-ried out to identify morphology of wear debris on the lubricated machine moving system by means of computer image analysis. Namely the wear debris contained in lubricating oil extracted from movable machine equipment will be filtered through membrane filter(void diameter 0.45${\mu}m$) and will be analyzed with its data information such as 50% volume diameter aspect roundness and reflectivity. Morphological characteristic of wear debris is easily distinguished by four shape parameters it is necessary to divide small class of every 100 wear debris in total wear particles in order to distinguish morphological characteristic of wear debris more easily by computer image analysis. We are sure that operation condition diagnosis of the lubricated machine moving surfaces is possible by computer image analysis.

  • PDF

Dynamic analysis for complex structures using the improved component mode method (개선된 콤포넌트 모드법을 이용한 거대구조물의 동적해석)

  • 심재수;박명균
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1993.04a
    • /
    • pp.37-44
    • /
    • 1993
  • There are a lot of linear dynamic analysis methods for complex structures. Each method has advantages and shortcomings. Method of dynamic analysis for complex structure is selected considering characteristics of dynamic loading, computer facility available number of degree of freedem and accuracy of results. It is a main point of view to get economical results rather then accurate ones for analysis of general complex structures, Mode superposition method and direct integration method are generally used. However, the characteristics of load is not considered in mode superpositon method, the personal computer cannot be used in direct integration methods. To over-come these shortcomings, the component mode method incorporating Ritz algorithm updated is proposed to solve economically dynamic behavior of the structures. The purpose of study is a formulation of algorithm, and computer programing suitable for dynamic analysis of the complex structure in personal computer environment.

  • PDF

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.79-83
    • /
    • 2016
  • In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.