Voltage instability of power system comes from increasing load rapidly, and causes bus voltage to drop. When voltage is out of control and it can be voltage collapse. This paper presents the fuzzy modeling approach to...
详细信息
Session Initiation Protocol (SIP) [1] is adopted as the main signaling protocol for the IP Multimedia Subsystem (IMS). Large dep.oyment of SIP servers in Next Generation Networks (NGN) requires studying the behavior a...
详细信息
Prolog affords concise, elegant, and clean solutions for many interesting problems, but is not immune to the software engineering challenges of large-scale application development. Code modularization, using modules o...
详细信息
This paper presents an approach based on Monte Carlo Simulation (MCS) to solve the Capacitated Vehicle Routing Problem (CVRP) with maximum traveling distance per route and additional costs per service, which introduce...
详细信息
With the emergence of Web 2.0 applications, where information is not only shared across the internet, but also syndicated, evaluated, selected, recombined, edited, etc., quality emergence by collaborative effort from ...
详细信息
ISBN:
(纸本)9781605588292
With the emergence of Web 2.0 applications, where information is not only shared across the internet, but also syndicated, evaluated, selected, recombined, edited, etc., quality emergence by collaborative effort from many users becomes crucial. However, users may have low expertise, subjective views, or competitive goals. Therefore, we need to identify cooperative users with strong expertise and high objectivity. As a first step towards this aim, we propose criteria for user type classification based on prior work in psychology and derived from observations in Web 2.0. We devise a statistical model for many different user types, and detection methods for those user types. Finally, we evaluate and demonstrate both model and detection methods by means of an experimental setup. Copyright 2009 ACM.
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on the ratings of trusted users in the net...
详细信息
ISBN:
(纸本)9781605584355
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on the ratings of trusted users in the network. In this paper, we introduce a two dimensional trust model which dynamically gets updated based on users's feedbacks, in contrast to static trust values in current trust models. Explorability measures the extent to which a user can rely on recommendations returned by the social network of a trusted user. dep.ndability represents the extent to which a user's own ratings can be trusted by users trusting him directly and indirectly. We propose a method to learn the values of explorability and dep.ndability from raw trust data and feedback expressed by users on the recommendations they receive. Positive feedback will increase the trust and negative feedback will decrease the trust among users. We performed an evaluation on the Epinions dataset, demonstrating that exploiting user feedback results in lower prediction error compared to existing trust-based and collaborative filtering approaches. Copyright 2009 ACM.
Leaf vein contains significant physiological information of plant. Leaf vein extraction is one of the key steps in plant modeling and plant recognition. Several methods have been presented on leaf vein extraction but ...
详细信息
The diffusion of new Internet and web technologies has increased the distribution of different digital content, such as text, sounds, images and videos. In this paper we focus on images and their role in the analysis ...
详细信息
The diffusion of new Internet and web technologies has increased the distribution of different digital content, such as text, sounds, images and videos. In this paper we focus on images and their role in the analysis of diversity. We consider diversity as a concept that takes into account the wide variety of information sources, and their differences in perspective and viewpoint. We describe a number of different dimensions of diversity;in particular, we analyze the dimensions related to image searches and context analysis, emotions conveyed by images and opinion mining, and bias analysis.
The emergence of peer-to-peer (P2P) applications has posed a threat to the operating cost of Internet Service Providers (ISPs) due to the large amount of inter-ISP traffic generated. The problem stems from the mismatc...
详细信息
暂无评论