Amidst the backdrop of increased urbanization and shifting climate patterns, this research delves into the growing vulnerability of landscapes to floods. The focus is on storm drain placement, emphasizing the identifi...
详细信息
In this paper, we present an analytic tool solution for universities and the Colombian government, which allows them to identify the main factors that impact the performance of undergraduate students and also to predi...
详细信息
We postulate and analyze a nonlinear subsampling accuracy loss(SSAL)model based on the root mean square error(RMSE)and two SSAL models based on the mean square error(MSE),suggested by extensive preliminary *** SSAL mo...
详细信息
We postulate and analyze a nonlinear subsampling accuracy loss(SSAL)model based on the root mean square error(RMSE)and two SSAL models based on the mean square error(MSE),suggested by extensive preliminary *** SSAL models predict accuracy loss in terms of subsampling parameters like the fraction of users dropped(FUD)and the fraction of items dropped(FID).We seek to investigate whether the models depend on the characteristics of the dataset in a constant way across datasets when using the SVD collaborative filtering(CF)*** dataset characteristics considered include various densities of the rating matrix and the numbers of users and *** simulations and rigorous regression analysis led to empirical symmetrical SSAL models in terms of FID and FUD whose coefficients depend only on the data *** SSAL models came out to be multi-linear in terms of odds ratios of dropping a user(or an item)*** dropping ***,one MSE deterioration model turned out to be linear in the FID and FUD odds where their interaction term has a zero *** importantly,the models are constant in the sense that they are written in closed-form using the considered data characteristics(densities and numbers of users and items).The models are validated through extensive simulations based on 850 synthetically generated primary(pre-subsampling)matrices derived from the 25M MovieLens *** 460000 subsampled rating matrices were then simulated and subjected to the singular value decomposition(SVD)CF *** validation was conducted using the 1M MovieLens and the Yahoo!Music Rating *** models were constant and significant across all 3 datasets.
In developing optimal entrepreneurship, several variables such as motivation, knowledge, intensity, and capacity are required to determine their relationship using the Partial Least Square-Structural Equation Modeling...
详细信息
Although brain imaging has provided crucial insights into Alzheimer's disease (AD) progression, its limitations in capturing molecular changes have motivated the need to integrate and interpret transcriptomic data...
详细信息
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication envir...
详细信息
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication environments. The certificateless signature (CLS) scheme can ensure the integrity and validity of data and provide secure identity authentication for the IIoT, and several pairing-free CLS schemes have been proposed in recent years. However, we find they are vulnerable to the signature forgery attack of malicious key generation centers by safety analysis, which does not realize the security they have claimed. To solve this problem, we show an improved CLS scheme that achieves anonymity and formally proves its security under the hardness of the discrete logarithm problem in the random oracle. Comprehensive performance analysis and comparison show that our scheme has less communication and computation costs with higher security, and our construction is suitable for scenarios with limited resources. Finally, we apply this scheme to construct a mutual identity authentication protocol in the healthcare IIoT environment. 2014 IEEE.
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi...
详细信息
Buildings are essential geo-targets that contribute to the monitoring of urban development. Synthetic aperture radar (SAR) provides excellent opportunities for building segmentation as it is insensitive to sunlight il...
详细信息
Deep CNNs are increasingly prevalent in various application domains such as image processing. To explain a CNN prediction, it is popular to employ occlusion-based explanations (OBE). OBE helps users understand which p...
详细信息
State-of-the-art Large Language Models (LLMs) have shown remarkable capabilities for general Question Answering (QA) tasks. However, their practical use for answering mental health questions has been limited due to th...
详细信息
暂无评论