首页 > 最新文献

2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)最新文献

英文 中文
Examining the Matthew Effect on YouTube Recommendation System 马太效应对YouTube推荐系统的影响
Y. Liu, Min Qi Huang
YouTube has become the largest video sharing site and its recommendation system significantly affects people’s perceptions and behaviors. This study examined whether the Matthew effect exists on YouTube’s recommendation system, and tested how the two factors (views and subscriptions) affect the recommendation results. The data was collected from YouTube by Python program and analyzed by statistical methods. The statistical results confirmed the existence of the Matthew effect and revealed the significant influences of channel views and subscriptions on play counts. The implications for researchers, users, business units and channel owners are discussed.
YouTube已经成为最大的视频分享网站,它的推荐系统显著影响着人们的认知和行为。本研究考察了YouTube的推荐系统是否存在马太效应,并测试了这两个因素(浏览量和订阅量)是如何影响推荐结果的。数据通过Python程序从YouTube上收集,并通过统计学方法进行分析。统计结果证实了马太效应的存在,并揭示了频道浏览量和订阅量对播放次数的显著影响。对研究人员、用户、业务单位和渠道所有者的影响进行了讨论。
{"title":"Examining the Matthew Effect on YouTube Recommendation System","authors":"Y. Liu, Min Qi Huang","doi":"10.1109/taai54685.2021.00035","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00035","url":null,"abstract":"YouTube has become the largest video sharing site and its recommendation system significantly affects people’s perceptions and behaviors. This study examined whether the Matthew effect exists on YouTube’s recommendation system, and tested how the two factors (views and subscriptions) affect the recommendation results. The data was collected from YouTube by Python program and analyzed by statistical methods. The statistical results confirmed the existence of the Matthew effect and revealed the significant influences of channel views and subscriptions on play counts. The implications for researchers, users, business units and channel owners are discussed.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115422806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A stochastic logistic sigmoid regression using convex programming and clustering 基于凸规划和聚类的随机logistic s型回归
Tran Anh Tuan, T. N. Thang, V. Vu, Doãn Dung, Thi Ngoc Anh Nguyen
Logistic regression is one of the regression analysis methods that was studied a long time ago and its applications are widely used in many classification tasks. In this paper, a stochastic model is proposed by our that calls stochastic logistic sigmoid regression. This problem is solved by the new approach that transforms a deterministic problem into a stochastic problem and solves it by a convex programming problem. Besides, to estimate the mean and variance-covariance matrix of random variables, clustering algorithms, and quantile estimation are applied. The effectiveness of the model is evaluated by metrics for evaluating the performance of logistic regression. The results of the proposed algorithms, which are overcome over 1 to 2 percent with an accuracy score on three datasets, include many different fields data. They are also better than the ordinary logistic regression model on the same dataset with evaluation metrics, examples: f1 score, precision score, recall score, confusion matrix, et cetera.
逻辑回归是研究较早的回归分析方法之一,在许多分类任务中得到了广泛的应用。本文提出了一种随机模型,称为随机logistic s型回归。该方法将确定性问题转化为随机问题,并用凸规划问题求解。此外,为了估计随机变量的均值和方差协方差矩阵,应用了聚类算法和分位数估计。通过评价逻辑回归性能的指标来评价模型的有效性。所提出的算法的结果在三个数据集上的准确率超过1%到2%,其中包括许多不同领域的数据。它们也比具有评估指标的相同数据集上的普通逻辑回归模型更好,例如:f1分数,精度分数,召回分数,混淆矩阵等等。
{"title":"A stochastic logistic sigmoid regression using convex programming and clustering","authors":"Tran Anh Tuan, T. N. Thang, V. Vu, Doãn Dung, Thi Ngoc Anh Nguyen","doi":"10.1109/taai54685.2021.00046","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00046","url":null,"abstract":"Logistic regression is one of the regression analysis methods that was studied a long time ago and its applications are widely used in many classification tasks. In this paper, a stochastic model is proposed by our that calls stochastic logistic sigmoid regression. This problem is solved by the new approach that transforms a deterministic problem into a stochastic problem and solves it by a convex programming problem. Besides, to estimate the mean and variance-covariance matrix of random variables, clustering algorithms, and quantile estimation are applied. The effectiveness of the model is evaluated by metrics for evaluating the performance of logistic regression. The results of the proposed algorithms, which are overcome over 1 to 2 percent with an accuracy score on three datasets, include many different fields data. They are also better than the ordinary logistic regression model on the same dataset with evaluation metrics, examples: f1 score, precision score, recall score, confusion matrix, et cetera.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management Analysis of the Sustainable Supply Chain Using a Fuzzy Hybrid Approach in India 基于模糊混合方法的印度可持续供应链风险管理分析
Venkateswarlu Nalluri, Ching-Torng Lin, Long-Sheng Chen
Different sources of risk factors can happen in sustainable supply chain management due to their complex nature. The telecommunication service firm cannot implement multiple improvement practices altogether to overcome the risk factors with limited resources. The industries should evaluate the relationship between risk factors and explore the determinants of improvement measures. The present study aims to analyses and identifies critical risk factors (CRFs) for enhancing sustainable supply chain management practices in the Indian telecommunication industry using the hybrid approach. The relationship among these CRFs has been analyzed by using fuzzy interpretive structural modelling (FISM) and Fuzzy decision-making trial and evaluation laboratory (FDEMATEL) methods to explore the relationships between them. The common result of the present study is that the risks government policies (laws and regulations) (R13) are the most affecting CRFs of the sustainable supply chain in telecom service. In addition, the risk factors illegal activities (e.g.2G scams) (R3), environmental pollution(R18) are indirectly affected by high driving power CRFs. Based on the results, the government could build justice, fairness, open laws, and certainties to prevent risk in the telecoms supply chain; service providers could monitor the rapidly evolving technologies. The contribution of this study is using a hybrid approach to establish a hierarchical structural model for an effective understanding of CRFs relationships and to explore decisive risk factors.
由于风险因素的复杂性,在可持续供应链管理中可能会出现不同来源的风险因素。电信服务公司无法以有限的资源同时实施多个改进实践来克服风险因素。行业应评估风险因素之间的关系,并探索改善措施的决定因素。本研究旨在分析和确定关键风险因素(CRFs),以使用混合方法加强印度电信行业的可持续供应链管理实践。采用模糊解释结构模型(FISM)和模糊决策试验与评价实验室(FDEMATEL)方法分析了各指标间的关系。本研究的共同结果是,政府政策(法律法规)风险(R13)对电信业务可持续供应链的风险影响最大。此外,非法活动(如2g诈骗)(R3)、环境污染(R18)等风险因素也间接受到高驱动功率crf的影响。根据研究结果,政府可以建立公正、公平、公开的法律和确定性,以防止电信供应链中的风险;服务提供商可以监控快速发展的技术。本研究的贡献在于使用混合方法建立了一个层次结构模型,以有效地理解CRFs关系并探索决定性的风险因素。
{"title":"Risk Management Analysis of the Sustainable Supply Chain Using a Fuzzy Hybrid Approach in India","authors":"Venkateswarlu Nalluri, Ching-Torng Lin, Long-Sheng Chen","doi":"10.1109/taai54685.2021.00041","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00041","url":null,"abstract":"Different sources of risk factors can happen in sustainable supply chain management due to their complex nature. The telecommunication service firm cannot implement multiple improvement practices altogether to overcome the risk factors with limited resources. The industries should evaluate the relationship between risk factors and explore the determinants of improvement measures. The present study aims to analyses and identifies critical risk factors (CRFs) for enhancing sustainable supply chain management practices in the Indian telecommunication industry using the hybrid approach. The relationship among these CRFs has been analyzed by using fuzzy interpretive structural modelling (FISM) and Fuzzy decision-making trial and evaluation laboratory (FDEMATEL) methods to explore the relationships between them. The common result of the present study is that the risks government policies (laws and regulations) (R13) are the most affecting CRFs of the sustainable supply chain in telecom service. In addition, the risk factors illegal activities (e.g.2G scams) (R3), environmental pollution(R18) are indirectly affected by high driving power CRFs. Based on the results, the government could build justice, fairness, open laws, and certainties to prevent risk in the telecoms supply chain; service providers could monitor the rapidly evolving technologies. The contribution of this study is using a hybrid approach to establish a hierarchical structural model for an effective understanding of CRFs relationships and to explore decisive risk factors.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116950355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning in Cyber Security Analytics using NSL-KDD Dataset 使用NSL-KDD数据集的网络安全分析中的机器学习
Rui-Fong Hong, S. Horng, Shieh-Shing Lin
Classification is the procedure to recognize, understand, as well as group ideas and objects into given categories. Classification techniques adopt training data patterns to predict the likelihood that subsequent data will classify into one of the given categories. Classification techniques utilize a variety of algorithms to classify future datasets through training data patterns. In current society, many network attacks continue to carry out various types of attacks. This work performs data pre-processing and uses Python with machine learning algorithms to analyze the NSL-KDD data set. We use various machine learning methods, such as decision trees, random forests, Naïve Bayes, KNN, Gradient Boosted Trees, and SVM to analyze the confusion matrix and predict the accuracy. We also draw the ROC curve and the AUC area. We calculate the ACC accuracy and make a simple assessment of the quality of different algorithms. Test results show that through data pre-processing, machine learning algorithms can be performed with extremely high accuracy.
分类是识别、理解以及将想法和对象归为特定类别的过程。分类技术采用训练数据模式来预测后续数据归入给定类别之一的可能性。分类技术利用各种算法通过训练数据模式对未来的数据集进行分类。在当今社会,许多网络攻击不断进行各种类型的攻击。这项工作执行数据预处理,并使用Python和机器学习算法来分析NSL-KDD数据集。我们使用各种机器学习方法,如决策树、随机森林、Naïve贝叶斯、KNN、梯度提升树和支持向量机来分析混淆矩阵并预测准确性。我们还绘制了ROC曲线和AUC面积。我们计算了ACC的精度,并对不同算法的质量进行了简单的评价。测试结果表明,通过数据预处理,机器学习算法可以以极高的精度执行。
{"title":"Machine Learning in Cyber Security Analytics using NSL-KDD Dataset","authors":"Rui-Fong Hong, S. Horng, Shieh-Shing Lin","doi":"10.1109/taai54685.2021.00057","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00057","url":null,"abstract":"Classification is the procedure to recognize, understand, as well as group ideas and objects into given categories. Classification techniques adopt training data patterns to predict the likelihood that subsequent data will classify into one of the given categories. Classification techniques utilize a variety of algorithms to classify future datasets through training data patterns. In current society, many network attacks continue to carry out various types of attacks. This work performs data pre-processing and uses Python with machine learning algorithms to analyze the NSL-KDD data set. We use various machine learning methods, such as decision trees, random forests, Naïve Bayes, KNN, Gradient Boosted Trees, and SVM to analyze the confusion matrix and predict the accuracy. We also draw the ROC curve and the AUC area. We calculate the ACC accuracy and make a simple assessment of the quality of different algorithms. Test results show that through data pre-processing, machine learning algorithms can be performed with extremely high accuracy.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MLNN: A Novel Network Intrusion Detection Based on Multilayer Neural Network 基于多层神经网络的新型网络入侵检测
Chia-Fen Hsieh, Che-Min Su
The rapid development of network technology and related services has led to an increase in data traffic. Although some researches use machine learning (ML)-based intrusion detection schemes to detect intrusion. For network attacks, the changes in network traffic may lead to lower accuracy of machine learning-based models. It focuses on feature values ineffective learning materials, machine learning, and human learning similarly, and classifying data to analyze understanding, and take actions. The neural networks in deep learning used artificial neural network (ANNs) that imitate the functions of the human brain. Deep learning is a type of machine learning. The difference lies in inexperienced. In this paper, we proposed an intrusion detection architecture that based on a multi-layer neural network (MLNN). It processes data traffic and build a reliable intrusion detection model based on deep learning (DL). Compared with other machine learning or algorithms, Deep learning has the function of automatically extracting features and uses TensorFlow to execute Keras to analyze data. Through Keras, an open-source neural network library, intrusion detection targets can be achieved in a faster and more effective way. The main contribution of this paper includes considering various factors to evaluate and select, and let the integrated method perform intrusion detection.
网络技术和相关业务的快速发展导致了数据流量的增加。尽管一些研究使用基于机器学习(ML)的入侵检测方案来检测入侵。对于网络攻击,网络流量的变化可能导致基于机器学习的模型精度降低。它关注的是无效学习材料的特征值、机器学习和类似的人类学习,以及对数据进行分类以分析理解并采取行动。深度学习中的神经网络使用模仿人脑功能的人工神经网络(ann)。深度学习是机器学习的一种。区别在于缺乏经验。本文提出了一种基于多层神经网络(MLNN)的入侵检测架构。它对数据流量进行处理,并基于深度学习建立可靠的入侵检测模型。与其他机器学习或算法相比,深度学习具有自动提取特征的功能,并使用TensorFlow执行Keras来分析数据。通过开源神经网络库Keras,可以更快更有效地实现入侵检测目标。本文的主要贡献在于综合考虑各种因素进行评估和选择,并使综合方法进行入侵检测。
{"title":"MLNN: A Novel Network Intrusion Detection Based on Multilayer Neural Network","authors":"Chia-Fen Hsieh, Che-Min Su","doi":"10.1109/taai54685.2021.00017","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00017","url":null,"abstract":"The rapid development of network technology and related services has led to an increase in data traffic. Although some researches use machine learning (ML)-based intrusion detection schemes to detect intrusion. For network attacks, the changes in network traffic may lead to lower accuracy of machine learning-based models. It focuses on feature values ineffective learning materials, machine learning, and human learning similarly, and classifying data to analyze understanding, and take actions. The neural networks in deep learning used artificial neural network (ANNs) that imitate the functions of the human brain. Deep learning is a type of machine learning. The difference lies in inexperienced. In this paper, we proposed an intrusion detection architecture that based on a multi-layer neural network (MLNN). It processes data traffic and build a reliable intrusion detection model based on deep learning (DL). Compared with other machine learning or algorithms, Deep learning has the function of automatically extracting features and uses TensorFlow to execute Keras to analyze data. Through Keras, an open-source neural network library, intrusion detection targets can be achieved in a faster and more effective way. The main contribution of this paper includes considering various factors to evaluate and select, and let the integrated method perform intrusion detection.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Credit Risk in Peer-to-Peer Lending: A Machine Learning Approach with Few Features 预测点对点借贷中的信用风险:一种带有少量特征的机器学习方法
Y. Cheng, Hui-Ting Chang, Chia-Yu Lin, Heng-Yu Chang
Peer-to-peer (P2P) lending provides borrowers with relatively low borrowing interest rates and gives lenders a channel for investment on an online platform. Since most P2P lending does not require any guarantees, the overdue payment of borrowers results in a massive loss of lending platforms and lenders. Many risk prediction models are proposed to predict credit risk. However, these works build models with more than 50 features, which causes a lot of computation time. Besides, in most P2P lending datasets, the number of non-default data far exceeds the number of default data. These researches ignore the data imbalance issue, leading to inaccurate predictions. Therefore, this study proposes a credit risk prediction system (CRPS) for P2P lending to solve data imbalance issues and only require few features to build the models. We implement a data preprocessing module, a feature selection module, a data synthesis module, and five risk prediction models in CRPS. In experiments, we evaluate CRPS based on the de-identified personal loan dataset of the LendingClub platform. The accuracy of the CRPS can achieve 99%, the recall reaches 0.95, and the F1-Score is 0.97. CRPS can accurately predict credit risk with less than 10 features and tackle data imbalance issues.
P2P借贷为借款人提供了相对较低的借款利率,并为贷款人提供了一个在线平台上的投资渠道。由于大多数P2P借贷不需要任何担保,借款人逾期付款导致借贷平台和贷款人遭受巨大损失。人们提出了许多风险预测模型来预测信用风险。然而,这些作品建立的模型有50多个特征,这导致了大量的计算时间。此外,在大多数P2P借贷数据集中,非违约数据的数量远远超过违约数据的数量。这些研究忽略了数据不平衡问题,导致预测不准确。因此,本研究提出了一种P2P借贷信用风险预测系统(CRPS),以解决数据不平衡的问题,并且只需要很少的特征来构建模型。在CRPS系统中实现了数据预处理模块、特征选择模块、数据综合模块和五个风险预测模型。在实验中,我们基于LendingClub平台的去识别个人贷款数据集评估CRPS。CRPS的准确率达到99%,召回率达到0.95,F1-Score为0.97。CRPS可以用不到10个特征准确预测信用风险,解决数据不平衡问题。
{"title":"Predicting Credit Risk in Peer-to-Peer Lending: A Machine Learning Approach with Few Features","authors":"Y. Cheng, Hui-Ting Chang, Chia-Yu Lin, Heng-Yu Chang","doi":"10.1109/taai54685.2021.00064","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00064","url":null,"abstract":"Peer-to-peer (P2P) lending provides borrowers with relatively low borrowing interest rates and gives lenders a channel for investment on an online platform. Since most P2P lending does not require any guarantees, the overdue payment of borrowers results in a massive loss of lending platforms and lenders. Many risk prediction models are proposed to predict credit risk. However, these works build models with more than 50 features, which causes a lot of computation time. Besides, in most P2P lending datasets, the number of non-default data far exceeds the number of default data. These researches ignore the data imbalance issue, leading to inaccurate predictions. Therefore, this study proposes a credit risk prediction system (CRPS) for P2P lending to solve data imbalance issues and only require few features to build the models. We implement a data preprocessing module, a feature selection module, a data synthesis module, and five risk prediction models in CRPS. In experiments, we evaluate CRPS based on the de-identified personal loan dataset of the LendingClub platform. The accuracy of the CRPS can achieve 99%, the recall reaches 0.95, and the F1-Score is 0.97. CRPS can accurately predict credit risk with less than 10 features and tackle data imbalance issues.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128365241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unified Temporal Erasable Itemset Mining Approach 统一的时态可擦除项集挖掘方法
T. Hong, Hao Chang, Shu-Min Li, Yu-Chuan Tsai
Erasable-itemset mining is often utilized by factories in production planning to find combinations of materials which could cause an acceptable loss if all items in the combination are not available. However, product databases can change over time: new materials or products may be introduced and out-of-date materials or products eliminated. Traditional erasable-itemset mining algorithms do not account for this. Thus, when mining erasable itemsets, we take such additional time information into account. Various temporal constraints (itemset lifespan definitions) are also discussed in this paper. We propose a general temporal erasable itemset mining approach, which, can successfully mine the desired results under different constraints. The experimental performance about the execution time and memory consumption of the proposed method is also shown.
可擦项目集挖掘通常被工厂用于生产计划,以找到在组合中所有项目都不可用时可能造成可接受损失的材料组合。然而,产品数据库会随着时间的推移而变化:新材料或产品可能会被引入,过时的材料或产品可能会被淘汰。传统的可擦除项集挖掘算法没有考虑到这一点。因此,在挖掘可擦除项集时,我们考虑了这些额外的时间信息。本文还讨论了各种时间约束(项目集寿命定义)。提出了一种通用的时态可擦除项集挖掘方法,该方法可以在不同的约束条件下成功地挖掘出期望的结果。最后给出了该方法的执行时间和内存消耗的实验结果。
{"title":"A Unified Temporal Erasable Itemset Mining Approach","authors":"T. Hong, Hao Chang, Shu-Min Li, Yu-Chuan Tsai","doi":"10.1109/taai54685.2021.00044","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00044","url":null,"abstract":"Erasable-itemset mining is often utilized by factories in production planning to find combinations of materials which could cause an acceptable loss if all items in the combination are not available. However, product databases can change over time: new materials or products may be introduced and out-of-date materials or products eliminated. Traditional erasable-itemset mining algorithms do not account for this. Thus, when mining erasable itemsets, we take such additional time information into account. Various temporal constraints (itemset lifespan definitions) are also discussed in this paper. We propose a general temporal erasable itemset mining approach, which, can successfully mine the desired results under different constraints. The experimental performance about the execution time and memory consumption of the proposed method is also shown.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User Addiction Behavior Towards Online Mobile Games Influences In Apps Purchase Behavior 用户对在线手机游戏的上瘾行为影响应用购买行为
Andri Dayarana Kristanta Silalahi, Teguh Indra Bayu
Topics regarding user behavior on online mobile games were widely discussed by scholars nowadays. As a relatively new topic, it is challenging for scholars to contributes theoretically and practically according to the user behavior in an online mobile game environment. Therefore, we investigate user behavior of online mobile games to understand the user in apps purchase intention. We conducted an online survey to 439 participants who have played online mobile games and experience purchase a game's features. Structural Equation Modelling was employed to test the research framework using Smart-PLS 3.0. The results show that user addiction behavior of online mobile games positively and significantly influences in-app purchase intention. We contribute to the addiction behavior of users regarding online mobile game use that generated purchase games features intention. Furthermore, the contributions are discussed in detail accordingly in the article.
关于手机网络游戏中的用户行为是目前学者们广泛讨论的话题。作为一个相对较新的课题,如何根据网络移动游戏环境下的用户行为进行理论和实践的研究,对学者来说都是一个挑战。因此,我们通过调查在线手机游戏的用户行为来了解用户在app中的购买意愿。我们对439名玩过在线手机游戏并体验过购买游戏功能的参与者进行了在线调查。采用Smart-PLS 3.0软件,采用结构方程模型对研究框架进行检验。结果表明,手机网络游戏用户成瘾行为对应用内购买意愿有显著正向影响。我们对在线手机游戏用户的成瘾行为做出贡献,从而产生购买游戏功能的意向。此外,本文还对这些贡献进行了详细的讨论。
{"title":"User Addiction Behavior Towards Online Mobile Games Influences In Apps Purchase Behavior","authors":"Andri Dayarana Kristanta Silalahi, Teguh Indra Bayu","doi":"10.1109/TAAI54685.2021.00066","DOIUrl":"https://doi.org/10.1109/TAAI54685.2021.00066","url":null,"abstract":"Topics regarding user behavior on online mobile games were widely discussed by scholars nowadays. As a relatively new topic, it is challenging for scholars to contributes theoretically and practically according to the user behavior in an online mobile game environment. Therefore, we investigate user behavior of online mobile games to understand the user in apps purchase intention. We conducted an online survey to 439 participants who have played online mobile games and experience purchase a game's features. Structural Equation Modelling was employed to test the research framework using Smart-PLS 3.0. The results show that user addiction behavior of online mobile games positively and significantly influences in-app purchase intention. We contribute to the addiction behavior of users regarding online mobile game use that generated purchase games features intention. Furthermore, the contributions are discussed in detail accordingly in the article.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"456 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Coordination in Multi-Agent Reinforcement Learning 多智能体强化学习中的局部协调
Fanchao Xu, Tomoyuki Kaneko
This paper studies cooperative multi-agent reinforcement learning problems where agents pursue a common goal through their cooperation. Because each agent needs to act individually on the basis on its local observation, the difficulty of learning depends on to what extent information can be exchanged among agents. We extend value-decomposition networks (VDN), a framework requiring the least communication, by allowing information exchange within a local group and present residual group VDN (RGV). We empirically show that the performance of RGV is better than VDN and other state-of-the-art methods in the predator-prey game. Also, on three tasks in the StarCraft Multi-Agent Challenge, RGV showed comparable performance with more sophisticated methods utilizing more information or communication. Therefore, our RGV is an alternative method worth further research.
本文研究了协作式多智能体强化学习问题,即智能体之间通过合作来追求共同的目标。因为每个智能体需要根据其局部观察单独行动,学习的难度取决于智能体之间信息交换的程度。我们扩展了价值分解网络(VDN),这是一个需要最少通信的框架,通过允许在本地组和剩余组VDN (RGV)内进行信息交换。我们的经验表明,在捕食者-猎物博弈中,RGV的性能优于VDN和其他最先进的方法。此外,在《星际争霸》Multi-Agent Challenge中的三个任务中,RGV使用了更复杂的方法并使用了更多的信息或交流。因此,我们的RGV是一种值得进一步研究的替代方法。
{"title":"Local Coordination in Multi-Agent Reinforcement Learning","authors":"Fanchao Xu, Tomoyuki Kaneko","doi":"10.1109/taai54685.2021.00036","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00036","url":null,"abstract":"This paper studies cooperative multi-agent reinforcement learning problems where agents pursue a common goal through their cooperation. Because each agent needs to act individually on the basis on its local observation, the difficulty of learning depends on to what extent information can be exchanged among agents. We extend value-decomposition networks (VDN), a framework requiring the least communication, by allowing information exchange within a local group and present residual group VDN (RGV). We empirically show that the performance of RGV is better than VDN and other state-of-the-art methods in the predator-prey game. Also, on three tasks in the StarCraft Multi-Agent Challenge, RGV showed comparable performance with more sophisticated methods utilizing more information or communication. Therefore, our RGV is an alternative method worth further research.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131889350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Affecting Vlog Viewers' Behavioral Intentions: An Empirical Study Based on Innovation Diffusion Theory 视频博客观众行为意向的影响因素:基于创新扩散理论的实证研究
Hsiao-Kuang Kao, Su-Nan Tsai, Wan-Ling Chang, Jui-Hsiu Chang
The purpose of this study is to apply the Innovation Diffusion Theory (IDT) to explore various factors affecting behavioral intentions among Vlog viewers, moreover, to understand related impacts on behavioral intentions of the Innovation Diffusion Theory with different background variables. This study uses online survey questionnaires for data collection and analysis. A total of 255 questionnaires of Vlog viewers across Taiwan were collected to test the hypothesized research model. A data analysis was performed using structural equation modelling(SEM). The results of the analysis fully supported the hypotheses and have revealed that the IDT has a direct and significant influence on the behavioral intention of Vlog Viewers. Further discussion of practical applications and future research is included.
本研究旨在运用创新扩散理论(IDT)探讨影响Vlog观众行为意图的各种因素,并了解不同背景变量下创新扩散理论对行为意图的相关影响。本研究采用在线调查问卷进行数据收集和分析。本研究共收集了255份台湾地区的Vlog观众问卷,以检验假设的研究模型。使用结构方程模型(SEM)进行数据分析。分析结果充分支持了假设,并揭示了IDT对Vlog观众的行为意愿有直接而显著的影响。进一步讨论了实际应用和未来的研究方向。
{"title":"Factors Affecting Vlog Viewers' Behavioral Intentions: An Empirical Study Based on Innovation Diffusion Theory","authors":"Hsiao-Kuang Kao, Su-Nan Tsai, Wan-Ling Chang, Jui-Hsiu Chang","doi":"10.1109/taai54685.2021.00039","DOIUrl":"https://doi.org/10.1109/taai54685.2021.00039","url":null,"abstract":"The purpose of this study is to apply the Innovation Diffusion Theory (IDT) to explore various factors affecting behavioral intentions among Vlog viewers, moreover, to understand related impacts on behavioral intentions of the Innovation Diffusion Theory with different background variables. This study uses online survey questionnaires for data collection and analysis. A total of 255 questionnaires of Vlog viewers across Taiwan were collected to test the hypothesized research model. A data analysis was performed using structural equation modelling(SEM). The results of the analysis fully supported the hypotheses and have revealed that the IDT has a direct and significant influence on the behavioral intention of Vlog Viewers. Further discussion of practical applications and future research is included.","PeriodicalId":343821,"journal":{"name":"2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Technologies and Applications of Artificial Intelligence (TAAI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1