LEADER 08355nam 2200553 450 001 9910488721303321 005 20240205155100.0 010 $a3-030-79474-1 035 $a(CKB)5590000000516487 035 $a(MiAaPQ)EBC6676215 035 $a(Au-PeEL)EBL6676215 035 $a(OCoLC)1257705307 035 $a(PPN)257359516 035 $a(EXLCZ)995590000000516487 100 $a20220327d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aComputer and information science 2021--summer /$fRoger Lee, editor 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (212 pages) 225 1 $aStudies in computational intelligence ;$vVolume 985 300 $aIncludes index. 311 $a3-030-79473-3 327 $aIntro -- Foreword -- Contents -- Contributors -- The Effect of Online Investor Sentiment on Stock Movements: An LSTM Approach -- 1 Introduction -- 2 Related Works -- 2.1 Researches on Traditional Stock Decision Analysis -- 2.2 Researches on the Prediction of Stock Trend Based on Social Media and Sentiment Analysis -- 3 Methods -- 3.1 Dataset -- 3.2 SentiCon Building -- 3.3 Sentiment Analysis -- 3.4 Correlation Analysis -- 4 Results and Discussions -- 4.1 Data Collection Results -- 4.2 Results of Sentiment Lexicon Building -- 4.3 Sentiment Analysis Results -- 4.4 Correlation Analysis -- 5 Conclusion -- References -- A Framework and Decision Algorithm to Determine the Best Feature Extraction Technique for Supporting Machine Learning-Based Hate Speech Detection -- 1 Introduction -- 2 FET Framework -- 2.1 Tweet Preprocessor -- 2.2 Tweet Vectorizer -- 2.3 Tweet Classifier -- 3 FET Decision Algorithm -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Sentiment Analysis of Stock Market Investors and Its Correlation with Stock Price Using Maximum Entropy -- 1 Introduction -- 2 Related Works -- 3 Overview of the Research -- 4 Crawling for Stock Data and User Comment -- 5 Data Prepossessing -- 5.1 Chinese Word Segmentation -- 5.2 Text Filtering: Removing Stop Words and Low-Frequency Words -- 5.3 Keyword Extraction Algorithm: TF-IDF -- 5.4 Text Vectorization and Word Matrix -- 6 Sentiment Classification of User Comment -- 6.1 Building a Classification Model of ME -- 6.2 Calculation of the Sentiment Index of Investor -- 7 Analysis of Experiment Result -- 7.1 Daily Analysis for the Sentiment Index of Investor -- 7.2 Comparative Analysis of Sentiment Index of Investor and Stock Price -- 8 Conclusions and Future Work -- References. 327 $aIntrusion Detection for Modern DDos Attacks Classification Based on Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning -- 2.2 Deep Learning -- 3 Methodology -- 3.1 CNN Model -- 4 System Implementation -- 4.1 Dataset -- 4.2 Dataset Distribution -- 4.3 Data Preprocessing -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- KnowGraph-PM: A Knowledge Graph Based Pricing Model for Semiconductor Supply Chains -- 1 Introduction -- 2 Background and Motivation -- 2.1 Background -- 2.2 Motivation -- 3 Implementation -- 3.1 Knowledge Graph (KG) -- 3.2 Lead Time-Based Pricing Algorithm -- 4 Evaluation -- 4.1 Competency Questions and KG Evaluation -- 4.2 Revenue Management (RM) -- 4.3 Discussion -- 5 Conclusion and Outlook -- References -- A Study on the Recognition of Hangeul Through Transitional Learning in Handwritten Application -- 1 Introduction -- 2 Research Background -- 2.1 Overview of Optical Character Recognition (OCR) -- 2.2 Whitelist -- 2.3 Recognition of Korean Letter -- 2.4 Korean Name -- 2.5 Korean Address -- 2.6 Transfer Learning -- 3 Research Method -- 3.1 LSTM-Based Open-Source Software Tesseract -- 3.2 Hangeul Training Data -- 3.3 Separation of the Data of the GED Application Form -- 3.4 Whitelist Application -- 4 Experiment Result -- 5 Conclusion -- 5.1 Research Summary and Implication -- 5.2 Future Challenge and Discussion Topics -- References -- Study on Partial Image Detection for Drawing-Focus on Unstructured Images Included in the Main Image -- 1 Introduction -- 2 Literature Review -- 2.1 Image Object Detection -- 2.2 Draw A Person (DAP) Test -- 2.3 Object Detection Algorithm -- 3 Methodology -- 4 Experiment and Verification -- 4.1 Experimental Method -- 4.2 Training -- 4.3 Verification -- 4.4 Analysis -- 5 Conclusions -- 5.1 Research Summary and Implication -- References. 327 $aFactors Affecting the Intention to Use Artificial Intelligence-Based Recruitment System: A Structural Equation Modeling (SEM) Approach -- 1 Introduction -- 2 Theoretical Background -- 2.1 Artificial Intelligence and Recruitment -- 2.2 Recruitment Procedure Act in Korea -- 2.3 AI Recruitment System -- 2.4 Technology, Organization, and Environment (TOE) Framework -- 2.5 Technology Acceptance Model (TAM) -- 3 Research Design -- 3.1 Research Hypothesis -- 4 Empirical Analysis -- 4.1 Reliability, Convergence Validity, and Discriminant Validity -- 4.2 Goodness of Fit -- 4.3 Structural Model for Hypotheses Testing -- 4.4 Moderating Effect Analysis -- 5 Conclusions -- References -- A Comparative Study of Vectorization Approaches for Detecting Inconsistent Method Names -- 1 Introduction -- 2 Method Name and Its Evaluation -- 2.1 Method Name -- 2.2 The Consistency Between the Method's Name and Body -- 2.3 Method Name Consistency Evaluation -- 3 Vectorization-Based Detection of Inconsistent Method Names -- 3.1 Vectorization Approaches Used in the Conventional Evaluation Procedure -- 3.2 Conventional Procedure -- 3.3 Challenge of Conventional Procedure and Alternatives -- 4 Comparative Study -- 4.1 Aim -- 4.2 Dataset and Computational Environment -- 4.3 Procedure -- 4.4 Results -- 4.5 Discussion -- 4.6 Threats to Validity -- 5 Conclusion and Future Work -- References -- Heart Sound Segmentation Based on a Joint HSMM Method -- 1 Introduction -- 2 Related Work -- 2.1 Heart Sound Segmentation -- 2.2 Model Training -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Model Training -- 3.3 Model Fusion Mechanism -- 3.4 Performance Metrics -- 4 Results and Discussion -- 4.1 Experiment Result -- 4.2 Discussion -- 5 Conclusion -- References -- A Novel Authentication System for Artwork Based on Blockchain -- 1 Introduction -- 2 Related Works -- 3 Proposed System. 327 $a3.1 Overall System Architecture -- 3.2 Database, Key Storage and Blockchain Records -- 3.3 Issuing QR Code Process -- 3.4 Verifying Ownership and Authenticity Process -- 3.5 Transferring Ownership Process -- 4 Security Analysis -- 5 Discussion and Contribution -- 6 Conclusions -- References -- Image Steganography Using GANs -- 1 Introduction -- 2 Proposed System -- 2.1 DCGAN Training -- 2.2 Extractor Training -- 2.3 Secure Communication -- 3 Experimental Results -- 3.1 DCGAN Training Results -- 3.2 Extractor Training Results -- 3.3 Secure Communication Implementation -- 3.4 Capacity -- 4 Conclusions -- References -- Coverage-Guided Fairness Testing -- 1 Introduction -- 2 Background -- 2.1 Individual Discrimination -- 2.2 Aequitas Approach -- 2.3 Combinatorial t-Way Testing -- 3 Coverage-Guided Fairness Testing (CGFT) -- 3.1 Obtain a Test Suite of Specified Size Using CT -- 3.2 Find Seed Data by Executing This Test Suite -- 3.3 Execute Aequitas' Local Search on These Seed Data -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Answers to Research Questions -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Author Index. 410 0$aStudies in computational intelligence ;$vVolume 985. 606 $aComputer science$vCongresses 606 $aInformàtica$2thub 606 $aCiències de la informació$2thub 608 $aCongressos$2thub 608 $aLlibres electrònics$2thub 615 0$aComputer science 615 7$aInformàtica 615 7$aCiències de la informació 676 $a004 702 $aLee$b R. Y$g(Roger Y.), 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910488721303321 996 $aComputer and information science 2021--summer$92817328 997 $aUNINA