Literaturliste

Anzahl der Treffer: 160
Erstellt: Thu, 25 Apr 2024 23:15:12 +0200 in 0.0528 sec


Yamamoto, Yukiko; Kawabe, Takashi; Tsuruta, Setsuo; Damiani, Ernesto; Yoshitaka, Atsuo; Mizuno, Yoshiyuki; Knauf, Rainer
Towards self-organizing Internet of Things - aware systems for online sales. - In: 11th International Conference on Signal-Image Technology and Internet-Based Systems, ISBN 978-1-4673-9721-6, (2015), S. 208-215

http://dx.doi.org/10.1109/SITIS.2015.85
Yamamoto, Yukiko; Tsuruta, Setsuo; Muranushi, Takayuki; Muranushi, Yuko Hada; Kobashi, Syoji; Mizuno, Yoshiyuki; Knauf, Rainer
Improvement of sun flare prediction by SVM integrated GA. - In: 11th International Conference on Signal-Image Technology and Internet-Based Systems, ISBN 978-1-4673-9721-6, (2015), S. 719-724

http://dx.doi.org/10.1109/SITIS.2015.37
Kawabe, Takashi; Namihira, Yoshimi; Suzuki, Kouta; Nara, Munehiro; Yamamoto, Yukiko; Tsuruta, Setsuo; Knauf, Rainer
A part-of-speech based sentiment classification method considering subject-predicate relation. - In: Big data analytics for human-centric systems, ISBN 978-1-4799-8697-2, (2015), S. 999-1004

Based on the topic and opinion classification, a tweet credibility analysis method is proposed to detect false information or rumors spreading on Twitter on and after the Great East Japan Earthquake. The credibility is assessed by calculating the ratio of the same opinions to all opinions about a topic identified by topic models generated using Latent Dirichlet Allocation. To identify an opinion (positive or negative) expressed in a tweet, a sentiment analysis is performed using a semantic orientation dictionary. However, the accuracy is a problem to identify the few false tweets. The accuracy of the originally proposed method was susceptible since the sentiment opinion of most tweets was identified negative by the baseline (namely Takamura's) semantic orientation dictionary. Furthermore, specialty namely expertise of users was not considered. To cope with these problems, a method for extracting sentiment orientations of words and phrases was proposed considering user's specialty / expertise degree or mark to each of the same / opposite opinion tweets. The effects of both improvements are proven by experiments using a large number of real tweets. Namely, in these experiments rumor tweets were detected more accurately.



http://dx.doi.org/10.1109/SMC.2015.181
Shinozaki, Tetsuo; Yamamoto, Yukiko; Tsuruta, Setsuo; Knauf, Rainer
Validation of context respectful counseling agent. - In: Big data analytics for human-centric systems, ISBN 978-1-4799-8697-2, (2015), S. 993-998

Many IT workers suffer from stress in doing their work and there are a few counselors to help them. To cope with this, a context respectful counseling agent (CRECA) is proposed. This agent extracts emotional words from clients' utterances throughout their dialogue to detect emotion changes and provides clients such changes as a dialogue summary. If no change is detected, it replies with paraphrases of clients' utterances followed by context-respectful prompts to narrow problems. The summary responses promote the reflection of clients. This way, the counseling agent can pretend to keep recognizing clients' psychological sufferings. It behaves as if it empathized with clients and continues talking to clients without losing their trust. Keeping reflection on themselves, clients reach more problem clarification and self-awareness, which enables them to solve their problems. Since the agent provides only information from clients' sayings and the summaries focused on the change in their emotions, there occur few problems of knowledge explosion and knowledge maintenance. An experiment verifies that our new agent with summarization function more effective than the agent without summarization function (Old CRECA) and ELIZA.



http://dx.doi.org/10.1109/SMC.2015.180
Fujikawa, Hiroshi; Yamaki, Hirofumi; Yamamoto, Yukiko; Tsuruta, Setsuo; Knauf, Rainer; Damiani, Ernesto
Evaluation of method for multiplexing communication routes to avoid intentional barriers. - In: Big data analytics for human-centric systems, ISBN 978-1-4799-8697-2, (2015), S. 815-820

It is common to operate an IT system where client computers in offices in a country access cloud computers in another country via the Internet. However, in some countries including China, network communication is often shut down by governmental bodies, in addition to network outage caused by network attacks. In case of such intentional interruptions, users need countermeasures to avoid them. Here, we propose a method to form bypass routes which consist of application-level gateways and intelligent routers placed at offices where client computers run, to select bypass routes based on the Internet status. A method for applying asymmetric criteria to decide whether to apply bypass routes is proposed for robust operation of Internetbased applications. Differential values of network latency are used for detecting intentional barriers through monitoring and analyzing the huge amount of temporal data, and absolute values to determine their ends. Such temporal data analysis knowledge is verified by a network simulator.



http://dx.doi.org/10.1109/SMC.2015.151
Kawabe, Takashi; Namihira, Yoshimi; Suzuki, Kouta; Nara, Munehiro; Sakurai, Yoshitaka; Tsuruta, Setsuo; Knauf, Rainer
Tweet credibility analysis evaluation by improving sentiment dictionary. - In: IEEE Congress on Evolutionary Computation (CEC), 2015, ISBN 978-1-4799-7493-1, (2015), S. 2354-2361

To detect false information or rumors spread on Twitter on and after the Great East Japan Earthquake, a tweet credibility assessing method was proposed, based on the topic and opinion classification. The credibility is assessed by calculating the ratio of the same opinions to all opinions about a topic identified by topic models generated using Latent Dirichlet Allocation. To identify an opinion (positive or negative) about a tweet, sentiment analysis is performed using a semantic orientation dictionary. However, it is a kind of imbalanced data analysis to identify usually very few false tweets and the accuracy is a problem. The accuracy of the originally proposed method was susceptible since the sentiment opinion of most tweets was identified negative by the baseline (namely Takamura's) semantic orientation dictionary. To cope with this problem, a method for extracting sentiment orientations of words and phrases is also proposed to improve the evaluation for analyzing the credibility of tweet information. This method 1) evolutionally learns from a large amount of social data on Twitter, 2) focuses on adjective predicates, and 3) considers co-occurrences with negation expressions or multiple adjectives, between subjects and predicates, etc. The effects are proven by experiments using a large number of real tweets, in which we could detect rumor tweet much more accurately. In opposition to the baseline semantic dictionary, our method leads to succeed in imbalanced data analysis.



http://dx.doi.org/10.1109/CEC.2015.7257176
Kawabe, Takashi; Kobayashi, Yuuta; Tsuruta, Setsuo; Sakurai, Yoshitaka; Knauf, Rainer
Case based human oriented delivery route optimization. - In: IEEE Congress on Evolutionary Computation (CEC), 2015, ISBN 978-1-4799-7493-1, (2015), S. 2368-2375

Delivery route optimization is a well-known NPcomplete problem based on the Traveling Salesman Problem (TSP) involving 20-2000 cities though human oriented factors make the problem more complex. Despite of NP-completeness, the scheduling should be solved every time within interactive response time and below expert level error or local optimality, considering human oriented factors including personal, social, and cultural factors. To cope with this, Cases and NI (Nearest Insertion) are introduced into a Genetic Algorithm (GA), based on the insight that real problems are similar to previous ones. A solution can be derived from former solutions, considering human oriented factors as follows: (1) retrieving the most similar cases, (2) modifying them by removing and adding locations by NI, and (3) further optimizing them by a GA using only NI operations. This cannot only diminish the costs to compute new solutions from scratch but also inherit many parts of previous routes to respect human factors. Experimental evaluation revealed remarkable results. Though the most effective TSP solving method LKH needed more than 3 seconds, the proposed method yielded results within 3% of the worst error rate and in less than 3 seconds. Furthermore, the proposed method is able to inherit most of the delivery routes, while LKH leads to significant changes.



http://dx.doi.org/10.1109/CEC.2015.7257178
Yamamoto, Yukiko; Knauf, Rainer; Miyazawa, Yuta; Tsuruta, Setsuo
Increasing the sensitivity of a personalized educational data mining method for curriculum composition. - In: Emerging issues in smart learning, ISBN 978-3-662-44187-9, (2015), S. 201-208

The paper introduces an improvement to an Educational Data Mining approach, which refrains from explicit learner modeling along with a recent refinement and evaluation. The technology models students' learning characteristics by considering real data instead of deriving their characteristics explicitly. It aims at mining course characteristics interdependencies of former students' study traces and utilizing them to optimize curricula of current students based to their performance traits revealed in their educational history. The recent refinement aims at increasing the sensitivity of the Data Mining technology by amplifying the influence of data, which shows interdependencies between the students' talents and weaknesses and weakening the influence of data from students, who perform about the same way in most courses (usually, very good or very poor in most subjects). Finally, the paper shows a validation approach by comparing the students' performance with the degree of similarity of their curriculum to the curriculum proposed by our technology.



Kawabe, Takashi; Suzuki, Masaki; Matsumaru, Taro; Yamamoto, Yukiko; Tsuruta, Setsuo; Sakurai, Yoshitaka; Knauf, Rainer
Distributed GAs with case-based initial populations for real-time solution of combinatorial problems. - In: 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS), ISBN 978-1-4799-4494-1, (2014), S. 95-101

http://dx.doi.org/10.1109/EALS.2014.7009509
Damiani, Ernesto; Kazancigil, Mustafa Asim; Frati, Fulvio; Birregah, Babiga; Knauf, Rainer; Tsuruta, Setsuo
Disaster early warning and relief: a human-centered approach. - In: Improving Disaster Resilience and Mitigation - IT Means and Tools, (2014), S. 135-151

Effective need collection is a major part of post-disaster assessment and recovery. A system for matching needs with available offers is an essential component for the recovery of communities in the aftermath of natural disasters. In the classic approach, the needs of disaster-stricken communities are collected by rescue personnel sampling a geographic grid and using emergency communication facilities. Subsequently, needs are matched to offers available at some central server and relief interventions are planned to deliver them. In this chapter, after an introduction to this approach, we explore the new notion of peer-to-peer community empowerment for some key activities of disaster management, including early warning systems, needs collection, and need-to-offer matching. Then, we present the design of a framework that leverages on the capacity for the communities to selforganize during crisis management, proposing advanced algorithms and techniques for need-offermatching. Our framework supports pre- and post-disaster use of social networks information and connectivity via an evolvable vocabulary, and supports metrics for resilience assessments and improvement.



http://dx.doi.org/10.1007/978-94-017-9136-6_9