Tourist flow prediction faces challenges in achieving high accuracy due to the complex and dynamic nature of tourism data. This study addresses these challenges by proposing a multi-feature combined prediction model, ...
详细信息
To prevent JavaScript developers from reinventing wheels, npm ecosystem provides numerous third-party libraries for developers to realize relevant functionalities. Npm displays the tags provided by the creators for th...
详细信息
ISBN:
(纸本)9781665437851
To prevent JavaScript developers from reinventing wheels, npm ecosystem provides numerous third-party libraries for developers to realize relevant functionalities. Npm displays the tags provided by the creators for these packages to help developers find suitable ones. However, not all creators have the habit of tagging their packages, and thus npm cannot provide tag information of a lot of packages for developers to help them understand the package functionalities effectively. Considering that many tags are unrelated to the functionality of packages, we propose a method to find out the tags that are important to distinguish the functionality categories of packages and assign them to untagged packages for assisting developers in the process of retrieving the packages. Firstly, we analyze the attribute of existing tags in npm to establish category tags (functionality categories). Then, we further mine the readme of tagged packages to generate keywords for each category tag. Finally, our method identifies category tags for untagged packages by measuring the similarity between their readme and the keywords of category tags. The evaluation demonstrates that our approach has a good performance in assigning category tags to untagged packages.
Computer science labs in universities have different demands in cloud computing compared with typical IT companies. They differ greatly in software requirements and resource utilization. As an instance, we propose bui...
详细信息
Computer science labs in universities have different demands in cloud computing compared with typical IT companies. They differ greatly in software requirements and resource utilization. As an instance, we propose building a private cloud based on microservices with Docker and Kubernetes in our laboratory to match our labs’ typical *** private cloud proposed in this paper is composed of multiple components such as authentication, service gateway, distributed storage, knowledge management, code management, etc. Furthermore, some typical research software systems are deployed as microservices in the private cloud. To satisfy complex software environment requirements, a multi version microservice is implemented. In our microservices platform, users can submit their own microservices and manage these microservices’ life cycle through a web interface. In addition, the platform will automatically start and stop low frequency services to improve resource utilization rate. We use laboratory resources to conduct experiments and build a platform. With deploying the platform in our laboratory, it shows that the platform meets most of typical demands in research work and improves research efficiency.
The 5G mobile network is a kind of critical information infrastructure for future Internet of Things. Due to its rapid development, the planning and deployment of 5G network base stations is a more urgent and meaningf...
详细信息
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo...
详细信息
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANETs with hierarchy organization structure like tank group, a new authentication and trust evaluation framework is proposed based on trusted computing technology, the concepts of "trusted attribute" and "trusted grade" are introduced, and the key management architecture as well as authentication process of mobile node are explained in detail. Moreover, the real applications of the presented framework in tank fight are discussed, and the trust evaluation methods and its argumentations in the presented framework are given.
Modern FABs use a large number of high-energy processes such as plasma, CVD, and ion implantation;the furnace is one of the important tools of semiconductor manufacturing. The FAB installed FTIR system due to the 12&q...
详细信息
Deep learning has recently been leveraged in the microfluidic research for intelligent image processing. However, it usually requires massive human efforts to label sufficient images for obtaining a precise deep learn...
详细信息
ETL tools are responsible for the extraction of data from sources, their cleansing and loading into a target data warehouse. However, nowadays, the design and development of ETL processes are performed in an in-house ...
详细信息
ETL tools are responsible for the extraction of data from sources, their cleansing and loading into a target data warehouse. However, nowadays, the design and development of ETL processes are performed in an in-house fashion, and need uniformed methodological foundations. In this paper, we propose a novel conceptual model for the modeling of ETL processes. We employ CommonCubes to represent the cubes in a target data warehouse. CommonCubes release the design of ETL processes from overdependence on the physical schema of the target data warehouse, and enable the designers to pay more efforts to data transforming than data loading when designing ETL processes. Based on the constraint functions on source attributes and the transforming operations on target attributes, we define ETL mappings 1:0 capture the semantics of various relationship cardinalities between source attributes and target attributes, which provide a good basis for the design of ETL processes.
Essential graph is a graphical representation for Markov equivalence classes of Bayesian networks. Learning essential graph can avoid some problems in traditional Bayesian networks learning algorithms: (1) the number ...
详细信息
Essential graph is a graphical representation for Markov equivalence classes of Bayesian networks. Learning essential graph can avoid some problems in traditional Bayesian networks learning algorithms: (1) the number of illegal structures is exponential, which infect the efficiency of structure learning;(2) comparing the structures in same equivalent class slow down the speed of convergence;(3) if the prior distribution for each structure is equal, the more structures contain in the equivalent class the higher prior probability of the class has. This paper employs two competitive bio-inspired algorithms, immune algorithm and co-evolutionary algorithm, for learning Essential graph. The algorithm combines dependency analysis and search-scoring approach together. Experiments show that the searching space was decreased, compare with prior works, the convergence speed and the efficiency was improved.
暂无评论