This paper proposes a system that is capable of detecting, recognizing and indicating traffic signs to the driver to provide a safe and convenient driving experience. The system is composed of three phases;image pre-p...
详细信息
Customer churn prediction has been used widely in various kind of domain especially subscription-basis industries. With the rapid growth of telecommunication industry over the last decade, this industry not only focus...
Customer churn prediction has been used widely in various kind of domain especially subscription-basis industries. With the rapid growth of telecommunication industry over the last decade, this industry not only focuses on providing numerous products, but also satisfying the customers as it is one of the key solutions to remain competitive. This research proposed MultiLayer Perceptron Method for churn prediction. The evaluation is compared with three classifiers which includes are Support Vector Machine, Naïve Bayes and Decision Tree in term of several aspects. In preprocessing phase, we employed Principal Component Analysis and normalization to find the correlation among all the variables. For the postprocessing, InfoGainAttribute is used to identify the highest factor attribute that leads to customer retention. It is found that MultiLayer Perceptron outperforms other classifiers and international plan plays important role to retain customer from leaving organization.
Commercial off-the-shelf (COTS) electronics are used in satellites that span the size, cost, and acceptable risk spectrum. At one extreme the CubeSat, a platform originally created for university-based spacecraft desi...
详细信息
Aviation industry is characterized by its broad utilization of modeling and simulation starting from concept demonstration to operator training. Scenario development is an important aspect of any simulation study, how...
详细信息
Future IoT is expected to get ubiquitous connection and access in a global scale. In the meantime, with the empowered communications capability for IoT devices, IoT will evolve to be highly autonomous, even under the ...
详细信息
Dynamical sampling deals with signals that evolve in time under the action of a linear operator. The purpose of the present paper is to analyze the performance of the basic dynamical sampling algorithms in the finite ...
Dynamical sampling deals with signals that evolve in time under the action of a linear operator. The purpose of the present paper is to analyze the performance of the basic dynamical sampling algorithms in the finite dimensional case and study the impact of additive noise. The algorithms are implemented and tested on synthetic and real data sets, and denoising techniques are integrated to mitigate the effect of the noise. We also develop theoretical and numerical results that validate the algorithm for recovering the driving operators, which are defined via a real symmetric convolution.
A keyphrase extraction technique endeavors to extract quality keyphrases from a given document, which provide a high-level summary of that document. Except statistical keyphrase extraction approaches, all other approa...
详细信息
A keyphrase extraction technique endeavors to extract quality keyphrases from a given document, which provide a high-level summary of that document. Except statistical keyphrase extraction approaches, all other approaches are either domain-dependent or require a sufficient amount of training data, which are rare at present. Therefore, in this paper, a new tree-based automatic keyphrase extraction technique is proposed, which is domain-independent and employs nominal statistical knowledge; but no train data are required. The proposed technique extracts a quality keyphrase through forming a tree from a candidate keyphrase; and later, it is expanded or shrunk or remained in the same state depending on other similar candidate keyphrases. At the end, keyphrases are extracted from the resultant trees based on a value, µ (which is the Maturity Index (MI) of a node in the tree), which enables flexibility in this process. A small µ value would yield many and/or lengthy keyphrases (greedy approach); whereas, a large µ value would yield lower and/or abbreviated keyphrases (conservative approach). Thereby, a user can extract his/her desired-level of keyphrases through tuning µ value. The effectiveness of the proposed technique is evaluated on an actual corpus, and compared with Rapid Automatic Keyphrase Extraction (RAKE) technique.
Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or u...
详细信息
ISBN:
(纸本)9781538675045
Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or unintentionally may reveal sensitive input matrices of the client as well as multiplication results to unauthorised entities. In this paper, we propose two protocols that use sparse matrices to prevent information leakage in outsourcing matrix multiplications to cloud computing without encryption. The protocols are considered lightweight compared to other comparable approaches. We also provide a running example to demonstrate how the protocols ensure no information leakage of client data.
暂无评论