Open Access Paper
28 December 2022 A new model of Internet addiction tendency based on machine learning
Zhijun Guo, Laigang Zhang
Author Affiliations +
Proceedings Volume 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022); 125061X (2022) https://doi.org/10.1117/12.2662545
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2022), 2022, Beijing, China
Abstract
This paper proposes a new model to analysis multi factors that affect internet addiction. Firstly, based on the latest research status and achievements of machine learning, this paper constructs a multi-factor weighted analysis model of Internet addiction tendency. Secondly, in order to analyze the determinants of internet addiction more effectively, this paper designs a deep belief network structure based on the method of machine. Through the training of this network, we can get more accurate weight distribution of various factors in the network structure, so as to extract more effective convolution features of multi-factors. Finally, it gives the compared experimental results which show that this new model can make the internet addiction tendency analysis method be more accurate and effective.

1.

INTRODUCTION

Internet is gradually booming. The network has been widely popularized in people’s daily life, and has had an important impact on people’s learning methods and thinking habits. The internet provides people with a comprehensive platform for communication, knowledge acquisition, entertainment and leisure, but at the same time, the negative effects are becoming increasingly prominent. For example, excessive use of the Internet will lead to people’s reduced immunity, declining academic performance and low interpersonal skills. This phenomenon is Internet addiction. Because of a chronic network dependence caused by excessive addiction to the network, it will cause social maladjustment and damage to physical and mental functions. Internet addiction can easily lead to people’s physical weakness, anxiety and depression, attention deficit hyperactivity disorder, personality alienation, social phobia, material dependence, and even crimes. Internet addiction has a lot of negative effects on people’s physical and mental health.

Nowadays, the internet has changed the traditional learning mode and lifestyle. The fast, convenient and colorful network has brought a lot of enjoyment to people. However, as a form of virtual social existence, the network will also bring some negative effects to people. Internet addiction is a new psychological disease. It is one of the negative effects brought by the Internet. It will lead to loneliness, depression, anxiety, social isolation and reduced happiness, so as to damage individual physiological, psychological and social functions.

As an interdisciplinary subject in many fields, machine learning study how the computers simulate or implement the human learning behaviors to acquire new knowledge or skills and reorganize the existing knowledge structures. The performance of the model can also be closer to the real performance of the Internet addiction tendency (IDT). The number of Internet users has increased, and Internet addiction has a great impact on people’s health1, 2. Therefore, many scholars have studied the problem of Internet addiction and its influencing factors and made some progress3-6. In this paper, therefore, a multi factor weight model (MFWM) analysis method of IDT is proposed to solve the above problems.

This paper constructs a multi-factor weighted analysis model of IDT. In order to analyze the determinants of internet addiction more effectively, this paper designs a Deep Belief Network (DBN) structure based on the method of machine to extract the convolution characteristics of IDT factors, and realize the analysis of IDT factors weight model. This study provides guidance, reference and suggestions for people to make rational use of the Internet and intervene Internet addiction behavior from the aspect of psychology and behavior. The results are as follows: The prediction efficiency of IDT of this method is high, which can effectively predict IDT, and the recall rate of IDT prediction is high, and the coverage of this method is closest to the ideal state.

The contribution of this paper is that it constructed a MFWM of IDT and designed a Deep Belief Network (DBN) structure. With using this DBN, it realized the multi factor weight sharing of IDT and effectively extracted the convolution characteristics of multi factors of IDT.

2.

RELATED WORKS

Zeeshan et al. put forward the research on students’ Internet addiction7, a kind of multidimensional behavior disorder, manifested in various physiological, psychological, and social diseases, which causes many functional and structural changes in the brain, accompanied by various related common diseases. 148 students were selected by stratified random sampling. Data were collected by academic ability scale, school ability scale, and diagnostic criteria of Internet addiction. Among them, 11 cases (7.86%) met the criteria of Internet addiction. This study shows that excessive use of the Internet can lead to addiction, which is an entity concerned by medical students. This method is effective, but the method is complex and the analysis time is high. Li et al. proposed a VMHC (Voxel-mirrored homotopic connectivity) based analysis of Internet addiction in adolescents8. Voxel mirror homotopy connection method was used to analyze the brain function of Internet addiction in adolescents. The VMHC method was used to obtain the functional connections between cerebral hemispheres and analyze the differences of VMHC between groups. This method can effectively diagnose the Internet Addiction of teenagers and improve the analysis effect of Internet addiction, but it is more complex. Hsieh et al. proved the relationship between psychological distress and victimization9. In this study, thousands of students in Taiwan primary school were selected as the research objects by using the national proportional stratified random sampling, and the hierarchical linear regression model was constructed to verify the research hypothesis. However, the accuracy of this method in analyzing IDT was not good.

Therefore, this paper constructs a multi-factor weighted analysis model of IDT. In order to analyze the determinants of internet addiction more effectively, this paper designs a Deep Belief Network (DBN) structure. Through the training of this network, it can get more accurate weight distribution of various factors in the network structure, so as to extract more effective convolution features of multi-factors. Finally, summarize the full text.

3.

CONSTRUCTION OF MFWM OF INTERNET ADDICTION TENDENCY

3.1

Analysis of the research status of machine learning

Machine learning is an important method for data prediction and data decision analysis through feature extraction and feature training. It can extract features of IDT, analyze the weight of multiple factors of IDT, and effectively analyze IDT. As one of the most important methods, DBN training has important application value. The network model is initialized by Restricted Boltzmann Machine (RBM), and then the initialization speed of the model is improved by this method. Using the backpropagation algorithm to study the data supervised. In this process, it optimized the parameters and proposed the expected model10-13.

In order to get network parameters, we use an unsupervised greedy algorithm to pre-train the network model. First, the first layer RBM1 is trained, a vector is generated in the visual layer of RBM1, and the generated value is transmitted to the hidden layer; Then, Thirusangu et al. reconstructed the input signal of the visual layer14, and the data of the visual layer is randomly extracted and transmitted to the hidden layer. It trains each layer by using the maximum function learning method and combining deep learning network and training mechanism. So we need less training time.

The weights of IDT are optimized and adjusted15, after the DBN pre-training is completed, the feature data of IDT extracted layer by layer from the input multi-layer RBM is substituted into the BP neural network. With the help of label data, the back propagation algorithm is used to optimize and adjust the weight extraction of IDT. After training the DBN, the initial weight w1, w2,.., wn of the network is obtained:

00089_PSISDG12506_125061X_page_2_1.jpg

In the formula, θ={w1, w2,.., wn, w} and θ are the weights to be fine-tuned, yi is the label of the sample, and yi’ is the prediction feature parameters in the model. Input the data sample of IDT with marked information into BP neural network, use BP algorithm to send back the error to the whole network model, fine-tune the parameters of (DBN) in each layer, and after constantly adjusting the parameters, the weight prediction value of IDT is obtained.

3.2

Construction of MFWM

In this paper, we use the MFWM of IDT to analyze the characteristics of IDT. In this paper, we use the deep learning method to carry out the Boltzmann machine variant of the IDT processing unit, and obtain the MFWM of two-way connection IDT16, 17, as shown in Figure 1.

Figure 1.

MFWM of IDT.

00089_PSISDG12506_125061X_page_3_1.jpg

This paper reconstructs the data of Internet addiction according to the MFWM of IDT and applies it to unsupervised learning for regression or classification of IDT data. In addition, RBM can be used as a generic model. Through this MFWM of IDT, the following analysis is carried out.

4.

ANALYSIS OF MFWM OF INTERNET ADDICTION TENDENCY

4.1

Deep belief networks

In this paper, the feature mining method is used to extract the data neurons of students’ Internet addiction, and the complexity features of Internet addiction data in each layer are obtained. Multiple feature maps are used to obtain the feature synaptic weight set of Internet addiction data under the constraint of neurons18. After the local average, the feature map resolution of each convolution layer is obtained, finally, we output the trend characteristics of Internet addiction data after various slight changes, and the specific deep network structure is shown in Figure 2.

Figure 2.

Deep learning network structure of Internet addiction data.

00089_PSISDG12506_125061X_page_4_1.jpg

This paper introduces a deep learning model, which can extract a large number of data features of Internet addiction, provide a lot of data for analysis and prediction of Internet addiction, improve the knowledge spectrum of data characteristics of Internet addiction, obtain more accurate data fitting ability of Internet addiction, and obtain the global optimal solution by repeated training, The traditional method can easily generate local optimal problem when predicting the multi factor weight of the tendency of Internet addiction data19. Without relying on the data label of sample Internet addiction in knowledge spectrum, the accuracy of prediction of the characteristics of Internet addiction data can be improved.

4.2

Convolution feature extraction of internet addiction data

In order to improve the effect of MFWM analysis of IDT, this paper uses a convolution feature to extract Internet addiction data, improves the Convolutional Neural Network (CNN) model through data transformation, and obtains structural variants of this CNN model. The structure of this convolution feature extraction process of Internet addiction data is shown in Figure 3.

Figure 3.

Convolution feature extraction structure of Internet addiction data.

00089_PSISDG12506_125061X_page_4_2.jpg

When xiRk, xi represents the weight vector of multi factor k -dimension of IDT, which is related to the k -th eigenvector in the data of Internet addiction. At this time, for the feature vector with n, the length of the characteristic data of the Internet addiction data is expressed as:

00089_PSISDG12506_125061X_page_4_3.jpg

In equation (2), ⊕ is the connection operator of IDT data. Xi : i + j is used to show the connection of Xi, Xi+1,…, Xi+j data of addiction tendency. wRhk represents the convolution operation of IDT data. At this time, the convolution kernel can extract the weights of Xi : i + h –1 features in IDT data at the same time20. For example, the feature ci of IDT data can be obtained from the feature vector window h. The calculation formula of the feature of IDT data is as follows:

00089_PSISDG12506_125061X_page_4_4.jpg

In equation (3), bR, b is the bias value of IDT data, and f is the nonlinear function of IDT weight. In this paper, convolution kernel is used to realize feature mapping set on feature security margin [X1 : h, X2 : h + 1,…, Хnh+1 : n] of IDT data:

00089_PSISDG12506_125061X_page_5_1.jpg

Among them, cRnh+1. The feature mapping of Internet addiction data is carried out by maximum pooling, and the maximum weight max{c} of addiction data is selected as the best correlation feature to obtain the important weight features in the feature mapping of IDT.

In order to improve the convolution feature extraction rate of addiction data, the Gated Recurrent Unit (GRU) unit is used to determine the memory direction of Internet addiction information flow. The unit structure of Internet addiction data characteristic GRU is shown in Figure 4.

Figure 4.

GRU unit structure.

00089_PSISDG12506_125061X_page_5_2.jpg

t represents the time activation value of Internet addiction data extraction, 00089_PSISDG12506_125061X_page_5_3.jpg represents the candidate activation value of Internet addiction data, 00089_PSISDG12506_125061X_page_5_4.jpg represents the previous activation value of Internet addiction data, and 00089_PSISDG12506_125061X_page_5_5.jpg represents the previous candidate activation value of Internet addiction data:

00089_PSISDG12506_125061X_page_5_6.jpg

The update gate 00089_PSISDG12506_125061X_page_5_7.jpg determines how far to update its activation value or content. The calculation formula of the update gate is shown in equation (6):

00089_PSISDG12506_125061X_page_5_8.jpg

This process uses a linear sum between the existing state and the new calculated state. The calculation method of this candidate state 00089_PSISDG12506_125061X_page_5_9.jpg is similar to the traditional RNN cycle unit, and the calculation method is shown in equation (7):

00089_PSISDG12506_125061X_page_5_10.jpg

In the formula, rt is the reset gate component and xt is the multiplication of elements. When 00089_PSISDG12506_125061X_page_5_11.jpg is close to 0, the reset gate can effectively make the unit read the first symbol of the input sequence and allow it to forget the previous state.

The calculation method of the reset gate is similar to that of the update gate, and the calculation method is shown in equation (8):

00089_PSISDG12506_125061X_page_6_1.jpg

In this paper, a two-layer recurrent neural network is used to process the multi factor characteristics of IDT. Each unit will have 128 GRU units, among which the size of the hidden IDT state data is 128. By concatenating the output features of IDT factors, a 100 * 128 matrix of IDT factors is obtained. At this time, this 100 * 128 matrix is the result of convolution feature extraction of IDT factors.

5.

ANALYSIS OF EXPERIMENTAL RESULTS

5.1

Experimental design

In order to verify the effectiveness of different methods, this paper adopts ReHo based analysis method of College Students’ Internet addiction (Method 1)7, VMHC based analysis method of adolescent Internet addiction (Method 2)8, improved Analytic Hierarchy Process (AHP) based analysis method of College Students’ Internet addiction behavior (Method 3)9 and this method to predict the accuracy of IDT, the effectiveness of different methods is verified by the prediction time and recall rate of IDT, the experimental analysis is carried out in Matlab environment, and the running system is windows8. Table 1 show the experimental parameter settings:

Table 1.

hardware and software environment configuration.

NameParameters
CPUIntel Core (TM) i5-4590@3.30GHz
Memory4.00GB
Operating system64 bit Windows8 professional
Development languagePython
Programming environmentEclipse4.2
CompilerJetBrains PyCharm Community Edition

According to the configuration parameters of software and hardware environment in Table 1, the specific experimental results are as follows:

  • (1) Prediction accuracy of IDT. The accuracy of prediction of IDT can reflect the effectiveness of MFWM analysis of IDT. The higher the accuracy of prediction of IDT, the better the effectiveness of MFWM analysis of IDT; On the contrary, the more effective the MFWM is.

  • (2) The prediction time of IDT. The shorter the prediction time is, the higher the efficiency is; On the contrary, the analysis efficiency of IDT is lower.

  • (3) IDT predicts recall rate. The recall rate of IDT prediction shows that the more effective the IDT analysis is; On the contrary, the less effective the IDT analysis is.

  • (4) The coverage of the MFWM of IDT Based on machine learning method is the closest to the ideal state.

5.2

Experimental result

(1) Prediction accuracy of IDT

Methods 1-3 and this paper are used to test the prediction accuracy of IDT, and Table 2 show prediction accuracy.

Table 2.

Prediction accuracy of IDT under different methods.

Iterations/timePrediction accuracy of IDT/%
Method 1Method 2Method 3Proposed Method
566726398
1062656297
1538696689
2046617090
2542545292
3060565596
Mean value52.362.861.393.7

There are differences in the prediction accuracy of IDT in Table 2. When the value of iterations is 15, the prediction accuracy of Method 1 is 38%, Method 2 is 69%, Method 3 is 66%, and this method is 89%. When the iteration is 30, the prediction accuracy of Method 1 is 60%, that of Method 2 is 56%, that of Method 3 is 55%, and that of this paper is 96%. The prediction accuracy of this new method is much better.

(2) Prediction time of IDT

The time-consuming test experiment of prediction of IDT is carried out based on Methods 1-3, and the proposed method. Table 3 shows the results.

Table 3.

Prediction time of IDT by different method (unit: s).

Iterations/timeTime used for prediction of IDT/s
Method 1Method 2Method 3Proposed Method
53952662
104861553
155255575
205859621
255067616
304953722
Mean value49.357.862.23.2

When the times of iterations is 5, the prediction time of IDT of Method 1 is 39s, the prediction time of IDT of Methods 2 is 52s, the prediction time of IDT of Methods 3 is 66s, and the prediction time of IDT of this method is only 2S. When the times is 20, the prediction time of IDT of Methods 1 is 58s, the prediction time of IDT of Methods 2 is 59s, the prediction time of IDT of Methods 3 is 62s, and the prediction time of IDT of this method is only 1s. This method needs far less time than others.

(3) IDT prediction recall rate

The paper uses Methods 1-3 and this paper to get the recall rate of IDT prediction. The results are shown in Figure 5.

Figure 5.

Recall rate of IDT Prediction.

00089_PSISDG12506_125061X_page_8_1.jpg

Figure 5 shows different recall rates of IDT prediction. When the experimental population is 400, the recall rate of IDT Prediction of Methods 1 can reach 40%, and 61% for Methods 2, 27% for Methods 3, 93% for this paper. When the experimental population is 600 people, the recall rate of IDT Prediction of Methods 1 can reach 63%, and 69% for Methods 2, 46% for Methods 3, 95% for this paper. So, wo can know this method is better for recall rate.

(4) IDT coverage

Based on the user’s test, it determines the coverage according to the comparison between the number of covered users and the remaining users in the evaluation process, calculates the algorithm coverage, and determines whether the algorithm is effective. The calculation formula of coverage is as follows:

00089_PSISDG12506_125061X_page_8_2.jpg

In the formula, Hh represents the recommended list; Aa represents the user set; Bb represents a collection of items. The comparative analysis results under different methods are shown in Figure 6.

Figure 6.

Comparison results of coverage.

00089_PSISDG12506_125061X_page_8_3.jpg

According to Figure 6, under the condition of no errors and exceptions, the maximum coverage of Methods 1 is 86%, 75% for of Methods 2, 64% for of Methods 3, 92% for this paper. Through comparative analysis, we can find that the coverage in this paper is the best, indicating that the coverage is smooth and complete.

According to the result below, anyway, this method in this paper has better performance for prediction accuracy, prediction time, recall rate and coverage.

6.

DISCUSSION ON INTERVENTION STRATEGIES OF INTERNET DEPENDENCE AND ADDICTION

6.1

Strengthening ideological and political education of internet addiction

We should carry out ideological intervention on people’s Internet addiction behavior and give full play to the educational role of Ideological and political education. By Focusing on improving the pertinence of Ideological and political education, and explaining the harm of Internet addiction with facts, it can enable people to bravely face the pressure and difficulties of life, transform fear, anxiety and other emotions into internal conscious power. And it also enable people to correctly view and use the network, enhance their ability to distinguish bad information, and maintain network order and abide by network rules in the scene of no monitoring. On the other hand, we should combine network ideological and political education with socialist education and patriotism education, cultivate people’s conscious network moral responsibility, strengthen the ability to identify network cultural values, timely correct the external factors closely related to Internet addiction, and describe the cases of Internet addicts, so as to enable people to have correct values and network cognition, to regard the Internet as a learning and leisure tool to avoid excessive use of the Internet and affecting their normal life. Relevant educators should pay attention to ideological and political education, build a good interactive relationship with internet addicts, give full play to their initiative, and ensure the long-term effectiveness of ideological and political education for Internet addicts. When carrying out ideological intervention on Internet addicts, we should also deeply explore the psychological problems of Internet Dependence addiction, understand people’s family life, temperament, interests and hobbies and learning life through psychological counseling and humanistic care, exchange ideas with people, dredge their internal feelings, promote the ideological transformation of Internet addicts, and guide them to establish correct three outlooks, So that people can actively face real life, change their original ideas, fully understand the ideological misunderstanding of Internet Dependence and addiction, and help people gradually reduce the number and time of surfing the Internet.

6.2

Building community monitoring and management mechanism

We should take the community as a unit, build a community monitoring and management mechanism. Community is an important carrier of people’s life, and the environment and people’s development play an important role. Therefore, it is very important to establish a community monitoring and management mechanism. The monitoring and management mechanism needs the support of society and family. We should always pay attention to people’s network psychology and network behavior, and give help, care and emotional support to people who depend on the network, and actively exchange ideas and communicate with them, and timely curb the tendency of Internet Dependence and addiction. To persuade and monitor the Internet addicts, master the subsequent use of the Internet, and timely stifle the tendency of Internet addiction. Community monitoring and management also has strong permeability. The Internet addicts will continue to be influenced by the people around them in the community, and people can communicate with each other. This mechanism is not easy to arouse people’s disgust, so that the intervention effect can be brought into full play. The monitoring and management mechanism should also give play to the monitoring role of the party and league organizations, constantly improve the code of conduct and articles of association of the party and League organizations, make them feedback on the network status of Internet addicts, standardize people’s Internet behavior and avoid them falling into the state of Internet addiction. The party and League organizations should actively carry out Internet themed education activities, and people’s hobbies and ages are relatively close. The degree of support and understanding between organizations is high, and there are no obstacles to communicate with each other. While enriching people’s daily life, it can also divert excessive attention to the network, and strengthen the pertinence and uniqueness of Internet addiction monitoring through the organization’s self-education function.

6.3

Improving the legal system and purify the source of the network

We should improve the construction of relevant laws, provide institutional guarantee for the network information industry and purify the source of network information. And we also fully implement the network real name system, protect the security and privacy of users’ identity information, put an end to bad information arbitrarily released by anonymous means, detect bad information on the network through the semantic understanding of network information, and then implement network filtering and shielding technology to filter and shield bad information on the network. The government should continue to give environmental, policy and financial support. And based on the original technology, they should further develop relevant technologies, and provide filtering and shielding technology to schools, stations, public libraries, communities, Internet cafe operators and other public fields. They also should establish a network bad information reporting platform, create a network information supervision and reporting mechanism to continuously improve the supervision linkage mechanism dominated by network police while applying network filtering and shielding technology. By the end, they should strengthen the organization and coordination ability, actively give play to the supervision role of network self-discipline organizations and network volunteers, and standardize the benign network order. The reporting platform should strengthen the punishment of bad information, ensure the importance of reporting processing efficiency, set up special boxes and columns for reporting network bad information, strictly abide by the reporting acceptance, answering and feedback mechanism, and make the reporting process public, regularly hold special rectification of network bad information, and target individuals and organizations that publish a large number of bad information. So that they cannot establish websites all their life, reduce the negative impact of bad information, at the same time, implement the high tax system of Internet cafes, so that people can only surf the Internet at home or school, restrain people’s irrational demand for Internet cafes, and provide people with a good network environment.

7.

CONCLUSION AND PROSPECT

7.1

Conclusion

The network has broadened people’s horizons, enabling them to enjoy the unprecedented convenience and rich life brought by high technology. At the same time, they have also been affected and impacted by many negative aspects such as thinking methods, values, behavior patterns and personal growth. Therefore, how to use the network reasonably and how to surf the Internet healthily is an urgent problem to be studied at present. Internet use is divided into normal Internet use, excessive Internet use, IDT and Internet addiction. Therefore, it is considered that the phenomenon of addiction in the process of Internet use does not occur suddenly, but often has a continuous process. For example, it may be normal to use the Internet at the beginning of use, and then there is excessive Internet use, followed by the tendency of Internet addiction, and finally there is Internet addiction, that is, it is a continuous pedigree process from healthy Internet access to Internet addiction. The normal use of the Internet is called healthy Internet behavior, and the excessive use of the Internet, IDT and Internet addiction is collectively referred to as unhealthy Internet behavior.

This paper proposes a multi factor weight model analysis method of IDT based on the machine learning method. By constructing the MFWM of IDT, The DBN is used to realize the weight sharing of IDT factors, extract the convolution characteristics of IDT factors, and realize the analysis of IDT factors weight model. This study provides guidance, reference and suggestions for people to make rational use of the Internet and intervene Internet addiction behavior from the aspect of psychology and behavior. The results are as follows: The prediction efficiency of IDT of this method is high, which can effectively predict IDT, and the recall rate of IDT prediction is high, and the coverage of this method is closest to the ideal state, which shows that the prediction effect of IDT of this method is better.

7.2

Prospect

  • (1) From the perspective of investigation and research, this paper focuses on the influence of multiple factors of IDT with the help of the statistical method of structural equation model. Due to the limitations of time and resources, it is difficult to fully cover contemporary college students in sample sampling. In addition, due to the complex occurrence mechanism of Internet addiction itself, there are many influencing factors, in addition to some factors involved in this study. In addition, there may be some other important factors, such as social and cultural environment, peer groups, physiological factors (EEG, neurobiological indicators), which may be important reasons for Internet addiction, which is difficult to be fully covered in this study.

  • (2) In the future research, if we can combine the methods of longitudinal research and experimental research, cooperate with researchers in different fields, and deeply explore the genetic mechanism and Treatment Countermeasures of College Students’ Internet addiction from different perspectives and levels, it will help to promote the relevant theoretical research work.

  • (3) Exploring the influencing factors and specific mechanism of Internet addiction has become the focus of psychological research in this field, which shows that its psychological mechanism is more complex. In future research, the introduction of multiple independent variables can be considered in order to further explore the mechanism of influencing factors of Internet addiction.

ACKNOWLEDGMENT

Authors thank Natural Science Foundation of Hunan Province with No. 2020JJ4434, Key Scientific Research Projects of Department of Education of Hunan Province with No. 19A312 and Hunan Provincial Science & Technology Project Foundation (2018TP1018, 2018RS3065) for the financial assistance provided for the research of this paper. They also thank lecturer Zhang Laigang of Liancheng University for sharing some addiction cases and preliminary analysis of the data, and Professor Liu Shuai for his guidance and help. With their help, authors had solved a series of problems.

REFERENCES

[1] 

Zhang, M. R., Yan, Z. M., Guo, X. L. and Fu, J. L., “Visualization analysis of internet addiction research based on CiteSpace,” Journal of Weifang Engineering Vocational College, 33 (04), 81 –89+95 (2020). Google Scholar

[2] 

Seki, T. and Inadera, H., “Relationship between internet addiction and depression among Japanese university students,” Journal of Affective Disorders, 256 668 –672 (2019). https://doi.org/10.1016/j.jad.2019.06.055 Google Scholar

[3] 

Gentile, A., Servidio, R., Caci, B., et al., “Social stigma and self-esteem as mediators of the relationship between Body Mass Index and Internet addiction disorder: An exploratory study,” Current Psychology (New Brunswick, N.J.), 40 (1), 159 –164 (2018). Google Scholar

[4] 

Woon, S. C., “Internet addiction and mental well-being among secondary school students in a Malaysian district: A crosssectional survey,” Journal of Clinical Psychiatry, 23 (4), 526 –528 (2020). Google Scholar

[5] 

Saleh, N. N. and Tamam, S., “Preliminary study of memory enhancement of USIM students with internet addiction disorder by the effect of quran therapy in terms of EEG power spectra,” Physics and Technology in Medicine, 1 (6), 45 –51 (2020). Google Scholar

[6] 

Millera, T. H., et al., “Prediction of bioconcentration factors in fish and invertebrates using machine learning,” Science of The Total Environment, 648 (1), 80 –89 (2019). https://doi.org/10.1016/j.scitotenv.2018.08.122 Google Scholar

[7] 

Zeeshan, M., et al., “Internet addiction in medical students,” Journal of Ayub Medical College Abbottabad JAMC, 2 (32), 33 –42 (2019). Google Scholar

[8] 

Li, M. M., Liao, X. P., Zhao, Z. Y., Fan, M. X. and Yan, C. H., “Voxel-mirrored homotopic connectivity in adolescents with internet addiction: A resting-state functional magnetic resonance imaging study,” Chinese Journal of Magnetic Resonance Imaging, 10 (04), 38 –43 (2019). Google Scholar

[9] 

Hsieh, Y. P., Wei, H. S., Hwa, H. L., et al., “The effects of peer victimization on children’s internet addiction and psychological distress: The moderating roles of emotional and social intelligence,” Journal of Child and Family Studies, 28 (9), 2487 –2498 (2019). https://doi.org/10.1007/s10826-018-1120-6 Google Scholar

[10] 

Cheng, H. and Liu, J., “Alterations in amygdala connectivity in internet addiction disorder,” Scientific Reports, 10 (1), 12 –19 (2020). Google Scholar

[11] 

Ostovar S., Bagheri R., Griffiths, M. D., et al., “Internet addiction and maladaptive schemas: The potential role of disconnection/rejection and impaired autonomy/performance,” Clinical Psychology & Psychotherapy, 13 (4), 55 –59 (2021). Google Scholar

[12] 

Wang, Z., Xie, Q., Xin, M, et al., “Cybervictimization, depression, and adolescent internet addiction: The moderating effect of prosocial peer affiliation,” Frontiers in Psychology, 11 (3), 11 –19 (2020). Google Scholar

[13] 

Khan, H. U., “Possible linkage between internet addiction, socio-demographic, and behavioural constructs: a case study of Saudi Arabia and Bahrain-based employees,” International Journal of Work Organisation and Emotion, 11 (1), 1 –12 (2020). https://doi.org/10.1504/IJWOE.2020.109420 Google Scholar

[14] 

Thirusangu, S., Kumar, A., Akansha, Y. A. and Patel, T., “A comparative study to assess the level of internet addiction among B.Sc. Nursing and GNM students at Rama College of Nursing Kanpur with a view to develop information booklet,” Asian Journal of Nursing Education and Research, 10 (3), 351 –362 (2020). https://doi.org/10.5958/2349-2996.2020.00075.0 Google Scholar

[15] 

Sadeqi, S., Sharifirahnmo, S., Fathi, A., et al., “Predicting Covid-19 Anxiety and its social stigma experience based on the dimensions of internet addiction after the first age of epidemic in students,” Health Research Journal, 5 (4), 268 –278 (2020). https://doi.org/10.29252/hrjbaq.5.4.268 Google Scholar

[16] 

Sivaraman, A., Surendran, H. and Thomas, S., “The study of internet addiction and self-esteem among college students across their gender,” International Journal of Research in Engineering, Science and Management, 21 (18), 22 –29 (2021). Google Scholar

[17] 

Majeed, N., Saladina M., Krompiec M., et al., “Using deep machine learning to understand the physical performance bottlenecks in novel thin - film solar cells,” Advanced Functional Materials, 30 (7), 1 –11 (2020). https://doi.org/10.1002/adfm.v30.7 Google Scholar

[18] 

Akdeniz, B., Gunduz, M., Calli, S., et al., “Parental attachment and the theory of mind abilities as predictors of internet addiction in Turkish adolescents,” Psychiatry and Clinical Psychopharmacology, 30 (3), 1 –18 (2020). https://doi.org/10.5455/PCP. Google Scholar

[19] 

Prakash, S. and Yadav, J. S., “An online cross-sectional study to assess the prevalence of Internet Addiction among people staying at their home during Lockdown due to COVID-19,” The International Journal of Indian Psychology, 8 (3), 2349 –3429 (2020). Google Scholar

[20] 

Dou D., Shek D., “Concurrent and longitudinal relationships between positive youth development attributes and adolescent internet addiction symptoms in Chinese mainland high school students,” International Journal of Environmental Research and Public Health, 18 (4), 1937 –1945 (2021). https://doi.org/10.3390/ijerph18041937 Google Scholar
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhijun Guo and Laigang Zhang "A new model of Internet addiction tendency based on machine learning", Proc. SPIE 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022), 125061X (28 December 2022); https://doi.org/10.1117/12.2662545
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Convolution

Data modeling

Analytical research

Machine learning

Feature extraction

Factor analysis

Back to Top