Vai al contenuto principale della pagina
Titolo: | Computer and information science 2021--summer / / Roger Lee, editor |
Pubblicazione: | Cham, Switzerland : , : Springer, , [2021] |
©2021 | |
Descrizione fisica: | 1 online resource (212 pages) |
Disciplina: | 004 |
Soggetto topico: | Computer science |
Informàtica | |
Ciències de la informació | |
Soggetto genere / forma: | Congressos |
Llibres electrònics | |
Persona (resp. second.): | LeeR. Y (Roger Y.) |
Note generali: | Includes index. |
Nota di contenuto: | Intro -- Foreword -- Contents -- Contributors -- The Effect of Online Investor Sentiment on Stock Movements: An LSTM Approach -- 1 Introduction -- 2 Related Works -- 2.1 Researches on Traditional Stock Decision Analysis -- 2.2 Researches on the Prediction of Stock Trend Based on Social Media and Sentiment Analysis -- 3 Methods -- 3.1 Dataset -- 3.2 SentiCon Building -- 3.3 Sentiment Analysis -- 3.4 Correlation Analysis -- 4 Results and Discussions -- 4.1 Data Collection Results -- 4.2 Results of Sentiment Lexicon Building -- 4.3 Sentiment Analysis Results -- 4.4 Correlation Analysis -- 5 Conclusion -- References -- A Framework and Decision Algorithm to Determine the Best Feature Extraction Technique for Supporting Machine Learning-Based Hate Speech Detection -- 1 Introduction -- 2 FET Framework -- 2.1 Tweet Preprocessor -- 2.2 Tweet Vectorizer -- 2.3 Tweet Classifier -- 3 FET Decision Algorithm -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Sentiment Analysis of Stock Market Investors and Its Correlation with Stock Price Using Maximum Entropy -- 1 Introduction -- 2 Related Works -- 3 Overview of the Research -- 4 Crawling for Stock Data and User Comment -- 5 Data Prepossessing -- 5.1 Chinese Word Segmentation -- 5.2 Text Filtering: Removing Stop Words and Low-Frequency Words -- 5.3 Keyword Extraction Algorithm: TF-IDF -- 5.4 Text Vectorization and Word Matrix -- 6 Sentiment Classification of User Comment -- 6.1 Building a Classification Model of ME -- 6.2 Calculation of the Sentiment Index of Investor -- 7 Analysis of Experiment Result -- 7.1 Daily Analysis for the Sentiment Index of Investor -- 7.2 Comparative Analysis of Sentiment Index of Investor and Stock Price -- 8 Conclusions and Future Work -- References. |
Intrusion Detection for Modern DDos Attacks Classification Based on Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning -- 2.2 Deep Learning -- 3 Methodology -- 3.1 CNN Model -- 4 System Implementation -- 4.1 Dataset -- 4.2 Dataset Distribution -- 4.3 Data Preprocessing -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- KnowGraph-PM: A Knowledge Graph Based Pricing Model for Semiconductor Supply Chains -- 1 Introduction -- 2 Background and Motivation -- 2.1 Background -- 2.2 Motivation -- 3 Implementation -- 3.1 Knowledge Graph (KG) -- 3.2 Lead Time-Based Pricing Algorithm -- 4 Evaluation -- 4.1 Competency Questions and KG Evaluation -- 4.2 Revenue Management (RM) -- 4.3 Discussion -- 5 Conclusion and Outlook -- References -- A Study on the Recognition of Hangeul Through Transitional Learning in Handwritten Application -- 1 Introduction -- 2 Research Background -- 2.1 Overview of Optical Character Recognition (OCR) -- 2.2 Whitelist -- 2.3 Recognition of Korean Letter -- 2.4 Korean Name -- 2.5 Korean Address -- 2.6 Transfer Learning -- 3 Research Method -- 3.1 LSTM-Based Open-Source Software Tesseract -- 3.2 Hangeul Training Data -- 3.3 Separation of the Data of the GED Application Form -- 3.4 Whitelist Application -- 4 Experiment Result -- 5 Conclusion -- 5.1 Research Summary and Implication -- 5.2 Future Challenge and Discussion Topics -- References -- Study on Partial Image Detection for Drawing-Focus on Unstructured Images Included in the Main Image -- 1 Introduction -- 2 Literature Review -- 2.1 Image Object Detection -- 2.2 Draw A Person (DAP) Test -- 2.3 Object Detection Algorithm -- 3 Methodology -- 4 Experiment and Verification -- 4.1 Experimental Method -- 4.2 Training -- 4.3 Verification -- 4.4 Analysis -- 5 Conclusions -- 5.1 Research Summary and Implication -- References. | |
Factors Affecting the Intention to Use Artificial Intelligence-Based Recruitment System: A Structural Equation Modeling (SEM) Approach -- 1 Introduction -- 2 Theoretical Background -- 2.1 Artificial Intelligence and Recruitment -- 2.2 Recruitment Procedure Act in Korea -- 2.3 AI Recruitment System -- 2.4 Technology, Organization, and Environment (TOE) Framework -- 2.5 Technology Acceptance Model (TAM) -- 3 Research Design -- 3.1 Research Hypothesis -- 4 Empirical Analysis -- 4.1 Reliability, Convergence Validity, and Discriminant Validity -- 4.2 Goodness of Fit -- 4.3 Structural Model for Hypotheses Testing -- 4.4 Moderating Effect Analysis -- 5 Conclusions -- References -- A Comparative Study of Vectorization Approaches for Detecting Inconsistent Method Names -- 1 Introduction -- 2 Method Name and Its Evaluation -- 2.1 Method Name -- 2.2 The Consistency Between the Method's Name and Body -- 2.3 Method Name Consistency Evaluation -- 3 Vectorization-Based Detection of Inconsistent Method Names -- 3.1 Vectorization Approaches Used in the Conventional Evaluation Procedure -- 3.2 Conventional Procedure -- 3.3 Challenge of Conventional Procedure and Alternatives -- 4 Comparative Study -- 4.1 Aim -- 4.2 Dataset and Computational Environment -- 4.3 Procedure -- 4.4 Results -- 4.5 Discussion -- 4.6 Threats to Validity -- 5 Conclusion and Future Work -- References -- Heart Sound Segmentation Based on a Joint HSMM Method -- 1 Introduction -- 2 Related Work -- 2.1 Heart Sound Segmentation -- 2.2 Model Training -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Model Training -- 3.3 Model Fusion Mechanism -- 3.4 Performance Metrics -- 4 Results and Discussion -- 4.1 Experiment Result -- 4.2 Discussion -- 5 Conclusion -- References -- A Novel Authentication System for Artwork Based on Blockchain -- 1 Introduction -- 2 Related Works -- 3 Proposed System. | |
3.1 Overall System Architecture -- 3.2 Database, Key Storage and Blockchain Records -- 3.3 Issuing QR Code Process -- 3.4 Verifying Ownership and Authenticity Process -- 3.5 Transferring Ownership Process -- 4 Security Analysis -- 5 Discussion and Contribution -- 6 Conclusions -- References -- Image Steganography Using GANs -- 1 Introduction -- 2 Proposed System -- 2.1 DCGAN Training -- 2.2 Extractor Training -- 2.3 Secure Communication -- 3 Experimental Results -- 3.1 DCGAN Training Results -- 3.2 Extractor Training Results -- 3.3 Secure Communication Implementation -- 3.4 Capacity -- 4 Conclusions -- References -- Coverage-Guided Fairness Testing -- 1 Introduction -- 2 Background -- 2.1 Individual Discrimination -- 2.2 Aequitas Approach -- 2.3 Combinatorial t-Way Testing -- 3 Coverage-Guided Fairness Testing (CGFT) -- 3.1 Obtain a Test Suite of Specified Size Using CT -- 3.2 Find Seed Data by Executing This Test Suite -- 3.3 Execute Aequitas' Local Search on These Seed Data -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Answers to Research Questions -- 5 Threats to Validity -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Author Index. | |
Titolo autorizzato: | Computer and information science 2021--summer |
ISBN: | 3-030-79474-1 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910488721303321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |