59 research outputs found

    Finding customer behavior insights for content creation in material and product sourcing using specialized topic analysis

    Get PDF
    In content creation, customer behavior insights are very important as they help creators find and create the content that drives sales. To comprehend customer needs, content creators need not just generalized information but also specific information, which can be different across markets and cultures. This information also needs some standards so it can be analyzed systematically. This paper aims to obtain customer insight into web content. Inside the web content, one possible source of this information is the tags based on customer feedback and the related entities. In this case, the product review data were collected and analyzed. However, manually analyzing feedback is a time-consuming activity. In this work, we formulated the topic analysis problem specialized for material and product sourcing, which could benefit product analysis and development. Technically, we also compared different text processing and classification methods, which set the benchmarks for reviewing the model performance in the future

    การพยากรณ์ราคาคอนโดมิเนียมในกรุงเทพมหานครโดยเทคนิค Web Mining (PREDICTING CONDOMINIUM PRICE IN BANGKOK USING WEB MINING TECHNIQUES)

    Get PDF
    ในกรุงเทพมหานคร คอนโดมิเนียมกลายเป็นที่อยู่อาศัยหลังแรกของคนส่วนใหญ่โดยเฉพาะอย่างยิ่งในกลุ่มคนเจเนเรชัน Y โดยราคาเป็นหนึ่งในปัจจัยสำคัญเมื่อลูกค้าตัดสินใจซื้อคอนโดมิเนียม บทความวิจัยฉบับนี้มุ่งสร้างโมเดลในการพยากรณ์ราคาขายต่อตารางเมตรของคอนโดมิเนียมในกรุงเทพมหานครเพื่อให้ผู้ตัดสินใจซื้อคอนโดมิเนียมนำไปใช้ในการประมาณการมูลค่าของคอนโดมิเนียมในอนาคตประกอบการตัดสินใจซื้อ การวิจัยได้รวบรวมข้อมูลจากเว็บไซต์ hipflat.co.th ผ่านเทคนิค Web Crawling และเทคนิค Mining โดยได้รับข้อมูล คือ ข้อมูลโครงการคอนโดมิเนียม จำนวน 1,465 แห่ง ซึ่งถูกสกัดให้อยู่ในรูปแบบระเบียนที่มีจำนวน 15 แอตทริบิวต์ โมเดลถูกพัฒนาขึ้นโดยใช้รูปแบบ Deep Learning ซึ่งมีความแม่นยำในการพยากรณ์สูงสุดหลังจากการทดสอบด้วยโมเดลในลักษณะ Supervised Learning จำนวน 5 รูปแบบ จากการวิจัยพบว่า ราคาของคอนโดมิเนียมในกรุงเทพมหานครสอดคล้องกับผลลัพธ์ที่ได้รับจากการพยากรณ์ด้วยโมเดลโดยข้อมูลในการพยากรณ์ผันแปรตามจำนวนห้องของคอนโดมิเนียมในแต่ละโครงการ ระยะทางจากสถานีรถไฟฟ้าและจำนวนปีที่คอนโดมิเนียมถูกสร้างขึ้นมา โมเดลสามารถพยากรณ์ราคาคอนโดมีเนียมโดยมีความคลาดเคลื่อนของการพยากรณ์อยู่ที่ร้อยละ 17.53คำสำคัญ: เว็บครอว์ลิงค์  เหมืองข้อมูล  การเรียนรู้ของเครื่องIn Bangkok, condominium is becoming a first home for many people especially Generation Y who prefer convenience of lifestyle. Price of the condominium is one of the most important factors for buyers’ decision-making. This study aims to formulate a model that predict a selling price per square meter of a condominium in Bangkok. This is to support buyer’s decision-making whether to buy or not by using the price prediction from the model. The training dataset was gathered using web crawling techniques from hipflat.co.th. There were 1,465 condominium projects in Bangkok were extracted with each record contains 15 attributes of information. This model was formulated by using a deep learning method based on the best performed after testing the model with testing dataset. Results show that the price of the condominium in Bangkok highly affected by the number of units in the condominium project, its distance from the BTS metro line, and the year of its construction, with the relative error of 17.53%.Keywords: Web Crawling, Mining, Machine Learnin

    Security layers and related services within the Horizon Europe NEUROPULS project

    Full text link
    In the contemporary security landscape, the incorporation of photonics has emerged as a transformative force, unlocking a spectrum of possibilities to enhance the resilience and effectiveness of security primitives. This integration represents more than a mere technological augmentation; it signifies a paradigm shift towards innovative approaches capable of delivering security primitives with key properties for low-power systems. This not only augments the robustness of security frameworks, but also paves the way for novel strategies that adapt to the evolving challenges of the digital age. This paper discusses the security layers and related services that will be developed, modeled, and evaluated within the Horizon Europe NEUROPULS project. These layers will exploit novel implementations for security primitives based on physical unclonable functions (PUFs) using integrated photonics technology. Their objective is to provide a series of services to support the secure operation of a neuromorphic photonic accelerator for edge computing applications.Comment: 6 pages, 4 figure

    Improving Sustainability Performance through Internet of Things Capability in Thailand: Mediating Role of IOT Enabled Supply Chain Integration

    Get PDF
    It is pretty hard to counter this fact that Internet of Things (IOT) is integrating boundary less businesses with technology. The same IOT is probably a long-term solution for enhancing sustainability performance in manufacturing sector as it can integrate various supply chain components in a way which was never done before. Purpose of this study is to check the impact of IOT capability on sustainability performance in manufacturing sector of Thailand in mediating role of IOT enables supply chain integration like internal, supplier and customer integration. Respondents were the employees of 62 manufacturing firms of Thailand whom opinion has been taken through structured questionnaire. SPSS and AMOS are used to analyze the data through confirmatory factor analysis and structural equation modeling. Results have affirmed that IOT capability can enhance sustainability performance while all three dimensions of IOT enabled supply chain integration have shown significant positive mediating role in the relationship between IOT capability and sustainability performance. This study is unique due to its novel outcome of sustainability performance which was not previously tested with IOT capability. The results have implications not only for manufacturing sector but can also facilitate policy making too

    Performance Analysis of a DEKF for Available Bandwidth Measurement

    Get PDF
    The paper presents a characterisation analysis of a measurement algorithm based on a Discrete-time Extended Kalman Filter (DEKF), which has recently been proposed for the estimation and tracking of end-to-end available bandwidth. The analysis is carried out by means of simulations for different rates of variations of the available bandwidth and permits assessing the performance of the measurement algorithm for different values of the filter parameters, that is, the covariance matrixes of the measurement and process noise

    Applications of ontology in the Internet of Things: a systematic analysis

    Get PDF
    Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, information exchange, and object addressing. However, a complete understanding of using ontology in the IoT mechanism remains lacking. The main goal of this research is to recognize the use of ontology in the IoT process and investigate the services of ontology in IoT activities. A systematic literature review (SLR) is conducted using predefined protocols to analyze the literature about the usage of ontologies in IoT. The following conclusions are obtained from the SLR. (1) Primary studies (i.e., selected 115 articles) have addressed the need to use ontologies in IoT for industries and the academe, especially to minimize interoperability and integration of IoT devices. (2) About 31.30% of extant literature discussed ontology development concerning the IoT interoperability issue, while IoT privacy and integration issues are partially discussed in the literature. (3) IoT styles of modeling ontologies are diverse, whereas 35.65% of total studies adopted the OWL style. (4) The 32 articles (i.e., 27.83% of the total studies) reused IoT ontologies to handle diverse IoT methodologies. (5) A total of 45 IoT ontologies are well acknowledged, but the IoT community has widely utilized none. An in-depth analysis of different IoT ontologies suggests that the existing ontologies are beneficial in designing new IoT ontology or achieving three main requirements of the IoT field: interoperability, integration, and privacy. This SLR is finalized by identifying numerous validity threats and future directions

    Simulation-based Queueing Models for Performance Analysis of IoT Applications

    Get PDF
    International audienceTo facilitate the development of Internet of Things (IoT) applications, numerous middleware protocols and APIs have been introduced. Such applications built atop reliable or unreliable protocols and they expose different characteristics. Additionally, with regard to the application context (e.g., emergency response operations), several Quality of Service (QoS) requirements must be satisfied. To study QoS in IoT applications, the provision of a generic performance analysis methodology is required. Queueing network models offer a simple modeling environment, which can be used to represent IoT interactions by combining multiple queueing model types for building queueing networks. The resulting networks can be used for performance analysis through analytical or simulation models. In this paper, we present several types of queueing models that represent different QoS settings of IoT interactions, such as intermittent mobile connectivity, message drop probabilities, message availability/validity and resource constrained devices. Using MobileJINQS, we simulate our models demonstrating the significant effect on response times and message success rates when varying QoS settings

    Peningkatan quality of experience pada permainan online multiplayer berbasis Arduino dengan menggunakan MQTT server

    Get PDF
    Online multiplayer games require internet networks to play with opposing players more exciting because multiple players can fight each other. The game experiences lag, which is expressed as the quality of experience (QoE), is one of the most common problems for online multiplayer games, causing the games less exciting to play. This study examined the implementation of Message Queue Telemetry Transport (MQTT) as a communication protocol in multiplayer online games using Arduino and compared its performance against HTTP. QoE used data collected using the mean opinion score (MOS) method. The MQTT resulted in an average QoE score of 3.9 (Pingpong) and 4 (TicTacToe) MOS units, while on HTTP 3.8 (PingPong and TicTacToe). The use of the MQTT communication protocol can improve the QoE of multiplayer online game players compared to HTTP.Permainan online multiplayer memerlukan jaringan internet agar dapat bermain lebih menarik dengan pemain lawan karena beberapa pemain bisa saling melawan satu sama lain. Salah satu kondisi permainan ini yang paling umum adalah permainan mengalami lag, yang dinyatakan sebagai quality of experience (QoE), sehingga permainan kurang menarik untuk dimainkan. Penelitian ini melakukan kajian implementasi Message Queue Telemetry Transport (MQTT) sebagai protokol komunikasi penghubung pada permainan online multiplayer di papan berbasis Arduino dan membandingkan kinerja QoE-nya terhadap HTTP. Metode mean opinion score (MOS) digunakan untuk merekam data yang diperlukan untuk menganalisis QoE. MQTT memperoleh rata-rata skor QoE sebesar 3,9 (Pingpong) dan 4 (TicTacToe) satuan MOS, sedangkan HTTP memperoleh rata-rata skor sebesar 3,8 (PingPong dan TicTacToe). Penggunaan protokol komunikasi MQTT dapat meningkatkan QoE pemain dalam permainan online karena skor rata-rata QoE-nya lebih tinggi dibandingkan dengan HTTP

    An improved public key cryptographic algorithm based on chebyshev polynomials and RSA

    Get PDF
    Due to its very desirable properties, Chebyshev polynomials are often used in the design of public key cryptographic systems. This paper discretizes the Chebyshev mapping, generalizes the properties of Chebyshev polynomials, and proposes an improved public key encryption algorithm based on Chebyshev chaotic mapping and RSA, i.e., CRPKC −Ki. This algorithm introduces alternative multiplication coefficients Ki, the selection of which is determined by the size of Tr(Td(x))mod N = Td(Tr(x))mod N, and the specific value selection rules are shared secrets among participants, overcoming the shortcomings of previous schemes. In the key generation and encryption/decryption stages, more complex intermediate processes are used to achieve higher algorithm complexity, making the algorithm more robust against ordinary attacks. The algorithm is also compared with other RSA-based algorithms to demonstrate its effectiveness in terms of performance and security
    corecore