In order to improve the effect of Chinese course resource push, a method of Chinese course resource push based on knowledge graph and similarity algorithm is proposed. First, determine the density of resource data and...
详细信息
In order to improve the effect of Chinese course resource push, a method of Chinese course resource push based on knowledge graph and similarity algorithm is proposed. First, determine the density of resource data and the dependency relationships between data, and construct a knowledge graph of Chinese language course resources. Then, calculate Min's distance and cosine distance to determine the continuity of resource data, search for discrete data, determine the frequency of occurrence of Chinese language course resource data with different attributes, and achieve similarity measurement of Chinese language course resources. Finally, cross compressing the characteristics of Chinese language course resources, matching Chinese language course resource data with demanders, a dual push module to push Chinese language course resources is introduced and Chinese language course resource push is achieved. The experimental results show that the proposed method can effectively reduce the similarity of push data and improve the efficiency of pushing Chinese language course resources.
Short-text similarity calculation is one of the hot issues in natural language processing research. The conventional keyword-overlap similarity algorithms merely consider the lexical item information and neglect the e...
详细信息
Short-text similarity calculation is one of the hot issues in natural language processing research. The conventional keyword-overlap similarity algorithms merely consider the lexical item information and neglect the effect of the word order. And some of its optimized algorithms combine the word order, but the weights are hard to be determined. In the paper, viewing the keyword-overlap similarity algorithm, the short English text similarity algorithm based on lexical chunk theory (LC-SETSA) is proposed, which introduces the lexical chunk theory existing in cognitive psychology category into the short English text similarity calculation for the first time. The lexical chunks are applied to segment short English texts, and the segmentation results demonstrate the semantic connotation and the fixed word order of the lexical chunks, and then the overlap similarity of the lexical chunks is calculated accordingly. Finally, the comparative experiments are carried out, and the experimental results prove that the proposed algorithm of the paper is feasible, stable, and effective to a large extent.
A novel approach has been introduced to enhance the efficiency of English intelligent question answering systems by leveraging a distance-based similarity algorithm. This innovation aims to address the current challen...
详细信息
Costal areas in China frequently suffer typhoon disasters, which always causes lots of damage. Learning from appropriate historical cases can improve the efficiency of emergency decision making. A novel spatio-tempora...
详细信息
ISBN:
(纸本)9781467376631
Costal areas in China frequently suffer typhoon disasters, which always causes lots of damage. Learning from appropriate historical cases can improve the efficiency of emergency decision making. A novel spatio-temporal similarity algorithm is proposed in this paper in order to find the most relevant typhoon cases. Cases similar to current typhoon disaster can be retrieved and ranked by similarity. Many factors including meteorological attributes of a typhoon and complex information of affected areas are analyzed. The track, the wind velocity, and the year of typhoons are selected as the main factors for algorithm designing. At last, the feasibility of this algorithm is testified with historical data in recent years. The proposed method can also be applied to other disaster domains.
Over the years, medicine has continuously tried to provide the best treatment for patients. In cancer treatment, science has been at the service of medicine, to treat and discover new and better treatment approaches ...
详细信息
Over the years, medicine has continuously tried to provide the best treatment for patients. In cancer treatment, science has been at the service of medicine, to treat and discover new and better treatment approaches to “save lives” or increase longevity. Among the new disciplines that have been used to try to meet these challenges are Big Data, Bioinformatics, Machine Learning, Data Mining, Pharmacogenomics and Genomics. Whole genome sequencing has led medicine into several fields, such as broad knowledge of the human body, high accuracy in detecting a pathology or the most promising therapeutic line for a particular individual. The aim of the study is to understand and evaluate the main similarity metrics that could eventually be used in drug recommendation systems in cancer patients. Ten of the most popular similarity indices were used in the evaluation of gene expression of twenty samples from the Genomics of Drug Sensitivity in Cancer (GDSC) Project dataset, concerning breast and skin cancer pathology. The results obtained from the tested similarity indices are discussed, proposing some of them for the mentioned types of recommendation systems.
The traditional collaborative filtering recommendation algorithm can't measure well the similarity among users under the condition of data sparsity, which leads to a decrease in the accuracy of the recommendation ...
详细信息
ISBN:
(纸本)9781728143231;9781728143224
The traditional collaborative filtering recommendation algorithm can't measure well the similarity among users under the condition of data sparsity, which leads to a decrease in the accuracy of the recommendation system. Therefore, we propose a collaborative filtering algorithm to improve similarity. We weight the number of common scoring items on the similarity calculation to improve the shortcomings of the usual Pearson correlation coefficient. Then, we use it to find the user's nearest neighbor set and predict the score of the item to generate a recommendation list. Experiments show that our algorithm can improve the accuracy of system recommendation effectively.
PurposeToday's in-demand skills may not be needed tomorrow. As companies are adopting a new group of technologies, they are in huge need of information technology (IT) professionals who can fill various IT positio...
详细信息
PurposeToday's in-demand skills may not be needed tomorrow. As companies are adopting a new group of technologies, they are in huge need of information technology (IT) professionals who can fill various IT positions with a mixture of technical and problem-solving skills. This study aims to adopt a sematic analysis approach to explore how the US Information Systems (IS) programs meet the challenges of emerging IT ***/methodology/approachThis study considers the application of a hybrid semantic analysis approach to the analysis of IS higher education programs in the USA. It proposes a semantic analysis framework and a semantic analysis algorithm to analyze and evaluate the context of the IS programs. To be more specific, the study uses digital transformation as a case study to examine the readiness of the IS programs in the USA to meet the challenges of digital transformation. First, this study developed a knowledge pool of 15 principles and 98 keywords from an extensive literature review on digital transformation. Second, this study collects 4,093 IS courses from 315 IS programs in the USA and 493,216 scientific publication records from the Web of Science Core *** the knowledge pool and two collected data sets, the semantic analysis algorithm was implemented to compute a semantic similarity score (DxScore) between an IS course's context and digital transformation. To present the credibility of the research results of this paper, the state ranking using the similarity scores and the state employment ranking were compared. The research results can be used by IS educators in the future in the process of updating the IS curricula. Regarding IT professionals in the industry, the results can provide insights into the training of their current/future ***/valueThis study explores the status of the IS programs in the USA by proposing a semantic analysis framework, using digital transformation as a case study to illustrate the a
In order to relieve the medical pressure, when patients with finger disability see a doctor, the degree of finger disability can be identified and judged by the equipment first, and then the doctor carries out the nex...
详细信息
ISBN:
(纸本)9783031138447;9783031138430
In order to relieve the medical pressure, when patients with finger disability see a doctor, the degree of finger disability can be identified and judged by the equipment first, and then the doctor carries out the next step of diagnosis and treatment. Aiming at the problem that the traditional recognition algorithm is not ideal, this paper proposes a finger disability recognition algorithm based on Holistically-nested edge detection algorithm. On the basis of extracting the edge of hand image with Holistically-nested edge detection algorithm, the similarity judgment is made between the experimental object's hand edge detection image and the standard hand edge detection image. The degree of finger joint integrity was analyzed by different similarity judgment, and then the degree of finger disability was judged. In order to verify the effectiveness of the method, 50 people's hand images were collected to establish a sample database of hand images, and a total of 600 simulated severed finger images were tested. The accuracy of finger disability recognition was 96.6%. This algorithm can effectively identify the degree of finger disability and improve the medical efficiency.
In Chinese record linkage, the similarity measurement of short text fields such as identifying information has an important influence on the effect of linkage. In this paper, we compared the performance of six differe...
详细信息
In Chinese record linkage, the similarity measurement of short text fields such as identifying information has an important influence on the effect of linkage. In this paper, we compared the performance of six different string comparators for Chinese record linkage, including Hamming, Levenshtein, Jaro, Overlap Coefficient, Cosine and Ratcliff-Obershelp similarity. At the same time, the expectation-maximization algorithm was used to perform the probabilistic record linkage. The results showed that compared with other string comparators, Jaro similarity not only gets higher precision and recall, but also has the least computational time. All in all, this comparator can be used if we focus on string spelling and pronunciation without considering semantic similarity.
Security vulnerability database research is an essential part of information security research. With the sharp increase in the number of vulnerabilities in recent years, it has become increasingly important to collect...
详细信息
ISBN:
(纸本)9781728166070
Security vulnerability database research is an essential part of information security research. With the sharp increase in the number of vulnerabilities in recent years, it has become increasingly important to collect and organize information about existing vulnerability databases. However, there is heterogeneity and redundancy of data between the databases, which makes it challenging to share vulnerability information. In response to the above problems, a comprehensive security vulnerability collection model is proposed. A total of 1.005 million pieces of vulnerability data are collected and analyzed in 11 mainstream vulnerability databases. By introducing the idea of the collection of automation, problems such as the untimely update of vulnerability database information and the low efficiency of vulnerability collection, are solved effectively. The structural framework and functional modules of the automatic vulnerability collection system are introduced, and the specific implementation of the system is given. Based on the text processing technology, the rules of deduplication (95.6% accuracy) and the intelligent framework for vulnerability database (IFVD) are proposed and implemented. Finally, Experiments show the feasibility of the scheme.
暂无评论