• Title/Summary/Keyword: information-based model

Search Result 19,908, Processing Time 0.042 seconds

An Optimized Mass-spring Model with Shape Restoration Ability Based on Volume Conservation

  • Zhang, Xiaorui;Wu, Hailun;Sun, Wei;Yuan, Chengsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1738-1756
    • /
    • 2020
  • To improve the accuracy and realism of the virtual surgical simulation system, this paper proposes an optimized mass-spring model with shape restoration ability based on volume conservation to simulate soft tissue deformation. The proposed method constructs a soft tissue surface model that adopts a new flexion spring for resisting bending and incorporates it into the mass-spring model (MSM) to restore the original shape. Then, we employ the particle swarm optimization algorithm to achieve the optimal solution of the model parameters. Besides, the volume conservation constraint is applied to the position-based dynamics (PBD) approach to maintain the volume of the deformable object for constructing the soft tissue volumetric model base on tetrahedrons. Finally, we built a simulation system on the PHANTOM OMNI force tactile interaction device to realize the deformation simulation of the virtual liver. Experimental results show that the proposed model has a good shape restoration ability and incompressibility, which can enhance the deformation accuracy and interactive realism.

Post-purchase Customer Choice Model for Subscription-based Information and Telecommunications Services (가입형 정보통신 서비스의 구매 후 고객선택모형)

  • Lee, Dong-Joo;Ryu, Ho-Chul;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.159-179
    • /
    • 2006
  • With the advances in information technologies and the wide acceptance of IT outsourcing practices, subscription-based information & telecommunications services(ITS) become more available. Convergence and intensified industry competition have made it an imperative for the ITS providers to keep their current customers and acquire new customers at the same time. In this study, we developed a framework for effective customer management based on the factors influencing the post-purchase customer choice: stay with the present provider or switch to another one. Specifically, we classified the factors into four categories: Holding factors, Defect factors, Inducement factors, and Hurdle factors depending on the characteristics of the influence and direction of the influence. Based on the classification, we developed a post-purchase customer choice model for the subscription-based ITS providers. Then, we illustrated a possible application of the model in the context of the broadband Internet access service. The model could be used to increase the competitive advantage of service providers through the effective customer management in the subscription-based ITS market.

A Nonparametric Additive Risk Model Based on Splines

  • Park, Cheol-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.1
    • /
    • pp.97-105
    • /
    • 2007
  • We consider a nonparametric additive risk model that is based on splines. This model consists of both purely and smoothly nonparametric components. As an estimation method of this model, we use the weighted least square estimation by Huller and Mckeague (1991). We provide an illustrative example as well as a simulation study that compares the performance of our method with the ordinary least square method.

  • PDF

Bootstrap Confidence Intervals for a One Parameter Model using Multinomial Sampling

  • Jeong, Hyeong-Chul;Kim, Dae-Hak
    • Journal of the Korean Data and Information Science Society
    • /
    • v.10 no.2
    • /
    • pp.465-472
    • /
    • 1999
  • We considered a bootstrap method for constructing confidenc intervals for a one parameter model using multinomial sampling. The convergence rates or the proposed bootstrap method are calculated for model-based maximum likelihood estimators(MLE) using multinomial sampling. Monte Carlo simulation was used to compare the performance of bootstrap methods with normal approximations in terms of the average coverage probability criterion.

  • PDF

Provably Secure Certificate-Based Signcryption Scheme without Pairings

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2554-2571
    • /
    • 2014
  • Certificate-based cryptography is a new cryptographic paradigm that provides an interesting balance between identity-based cryptography and traditional public key cryptography. It not only simplifies the complicated certificate management problem in traditional public key cryptography, but also eliminates the key escrow problem in identity-based cryptography. As an extension of the signcryption in certificate-based cryptography, certificate-based signcryption provides the functionalities of certificate-based encryption and certificate-based signature simultaneously. However, to the best of our knowledge, all constructions of certificate-based signcryption in the literature so far have to be based on the costly bilinear pairings. In this paper, we propose a certificate-based signcryption scheme that does not depend on the bilinear pairings. The proposed scheme is provably secure in the random oracle model. Due to avoiding the computationally-heavy paring operations, the proposed scheme significantly reduces the cost of computation and outperforms the previous certificate-based signcryption schemes.

Designing the Content-Based Korean Instructional Model Using the Flipped Learning

  • Mun, Jung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.6
    • /
    • pp.15-21
    • /
    • 2018
  • The purpose of this study is to design a Content-based Korean Class model using Flipped learning for foreign students. The class model that presents on this paper will lead the language learning through content learning, also it will be enable the student more active and to have an initiative in the class. Prior to designing a Content-based Korean Class model using Flipped learning, the concepts and educational significance and characteristics of flip learning were reviewed through previous studies. Then, It emphasizes the necessity of teaching method adapting Flipped learning to Content-based teaching method in Korean language education. It also suggests standards and principles of composition in Contents-based teaching method using Flipped learning. After designing the instructional model based on the suggested standards and principles, it presents a course of instruction about how learning methods, contents and activities should be done step by step. The Content-based Korean class model using the Flipped learning will be an alternative approach to overcome the limitations of teacher-centered teaching methods and lecture-teaching methods which are the dominant of present classroom environment.

User-Body Shadowing Analysis Technique in Ship Environment Based on the Uniform Geometrical Theory of Diffraction (균일 회절 이론을 이용한 선박 환경에서의 단말기 사용자 쉐도잉 분석 기법)

  • Kim, Chang-Hoe;Jung, Jae-Hoon;Lee, Seong Ro;Kim, Seong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1209-1215
    • /
    • 2014
  • The Uniform Geometrical Theory of Diffraction(UTD) is an effective technique to analyze the radio wave by ray-based calculation of the diffraction coefficient and the reflection coefficient. In this paper, user body shadowing based on the UTD is investigated when the user is close to the mobile device. Two cases are introduced. One is that the user is calling with the mobile attached to the ear(Head Model). The other is that the mobile is located about 15cm away from the user's chest(Chest Model) Radiation Model and Scattering Model are applied to these cases presenting which model is applicable.

Design and Evaluation of ANFIS-based Classification Model (ANFIS 기반 분류모형의 설계 및 성능평가)

  • Song, Hee-Seok;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.3
    • /
    • pp.151-165
    • /
    • 2009
  • Fuzzy neural network is an integrated model of artificial neural network and fuzzy system and it has been successfully applied in control and forecasting area. Recently ANFIS(Adaptive Network-based Fuzzy Inference System) has been noticed widely among various fuzzy neural network models because of its outstanding accuracy of control and forecasting area. We design a new classification model based on ANFIS and evaluate it in terms of classification accuracy. We identified ANFIS-based classification model has higher classification accuracy compared to existing classification model, C5.0 decision tree model by comparing their experimental results.

  • PDF

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

Analyzing a Class of Investment Decisions in New Ventures : A CBR Approach (벤쳐 투자를 위한 의사결정 클래스 분석 : 사례기반추론 접근방법)

  • Lee, Jae-Kwang;Kim, Jae-Kyeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.10a
    • /
    • pp.355-361
    • /
    • 1999
  • An application of case-based reasoning is proposed to build an influence diagram for identifying successful new ventures. The decision to invest in new ventures in characterized by incomplete information and uncertainty, where some measures of firm performance are quantitative, while some others are substituted by qualitative indicators. Influence diagrams are used as a model for representing investment decision problems based on incomplete and uncertain information from a variety of sources. The building of influence diagrams needs much time and efforts and the resulting model such as a decision model is applicable to only one specific problem. However, some prior knowledge from the experience to build decision model can be utilized to resolve other similar decision problems. The basic idea of case-based reasoning is that humans reuse the problem solving experience to solve a new decision. In this paper, we suggest a case-based reasoning approach to build an influence diagram for the class of investment decision problems. This is composed of a retrieval procedure and an adaptation procedure. The retrieval procedure use two suggested measures, the fitting ratio and the garbage ratio. An adaptation procedure is based on a decision-analytic knowledge and decision participants knowledge. Each step of procedure is explained step by step, and it is applied to the investment decision problem in new ventures.

  • PDF