The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** u...
详细信息
The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content *** user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social ***,a combination of multiple behaviors in profiling users has yet to be *** research takes a novel approach and explores user intent types based on multidimensional online behavior in information *** research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine *** research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data *** feedback is based on online behavior and practices collected by using a survey *** participants include both males and females from different occupation sectors and different *** data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their *** techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of *** average is computed to identify user intent type *** user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on th
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwr...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwright, 2018;Agarwal et al., 2017;Falahatgar et al., 2017;Heckel et al., 2019;Wang et al., 2024a;Gu and Xu, 2023;Kunisky et al., 2024), noisy searching (Berlekamp, 1964;Horstein, 1963;Burnashev and Zigangirov, 1974;Pelc, 1989;Karp and Kleinberg, 2007), among many others, the goal is to devise algorithms with the minimum number of queries that are robust enough to detect and correct the errors that can happen during the computation. In this work, we consider the noisy computing of the threshold-k function. For n Boolean variables x = (x1, ..., xn) ∈ {0, 1}n, the threshold-k function THk(·) computes whether the number of 1's in x is at least k or not, i.e., (Equation presented) The noisy queries correspond to noisy readings of the bits, where at each time step, the agent queries one of the bits, and with probability p, the wrong value of the bit is returned. It is assumed that the constant p ∈ (0, 1/2) is known to the agent. Our goal is to characterize the optimal query complexity for computing the THk function with error probability at most δ. This model for noisy computation of the THk function has been studied by Feige et al. (1994), where the order of the optimal query complexity is established;however, the exact tight characterization of the optimal number of queries is still open. In this paper, our main contribution is tightening this gap by providing new upper and lower bounds for the computation of the THk function, which simultaneously improve the existing upper and lower bounds. The main result of this paper can be stated as follows: for any 1 ≤ k ≤ n, there exists an algorithm that computes the THk function with an error probability at most δ = o(1), and the algorithm uses at most (Equation presented) queries in expectation. Here we define m (Eq
Signal processing based research was adopted with Electroencephalogram(EEG)for predicting the abnormality and cerebral *** proposed research work is intended to provide an automatic diagnostic system to determine the ...
详细信息
Signal processing based research was adopted with Electroencephalogram(EEG)for predicting the abnormality and cerebral *** proposed research work is intended to provide an automatic diagnostic system to determine the EEG signal in order to classify the brain function which shows whether a person is affected with schizophrenia or *** detection and intervention are vital for better ***,the diagnosis of schizophrenia still depends on clinical observation to *** reliable biomarkers,schizophrenia is difficult to detect in its early phase and hence we have proposed this *** this work,the EEG signal series are divided into non-linear feature mining,classification and validation,and t-test integrated feature selection *** this work,19-channel EEG signals are utilized from schizophrenia class and normal ***,the datasets initially execute the splitting process based on raw 19-channel EEG into 6250 sample point’s *** this process,1142 features of normal and schizophrenia class patterns can be *** other hand,157 features from each EEG patterns are utilized based on Non-linear feature extraction process where 14 principal features can be identified in terms of considering the essential *** last,the Deep Learning(DL)technique incorporated with an effective optimization technique is adopted for classification process called a Deep Convolutional Neural Network(DCNN)with mayfly optimization *** proposed technique is implemented into the platform of MATLAB in order to obtain better results and is analyzed based on the performance analysis framework such as accuracy,Signal to Noise Ratio(SNR),Mean Square Error,Normalized Mean Square Error(NMSE)and *** comparison,the proposed technique is proved to a better technique than other existing techniques.
In the past few years, the lane detection technique has become a key factor for autonomous driving systems and self-driving cars on the road. Among the various vehicle subsystems, the lane detection module is one of t...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying text...
详细信息
Topology is usually perceived intrinsically immutable for a given *** argue that optical topologies do not immediately enjoy such ***'optical skyrmions'as an example,we show that they will exhibit varying textures and topological invariants(skyrmion numbers),depending on how to construct the skyrmion vector when projecting from real to parameter *** demonstrate the fragility of optical skyrmions under a ubiquitous scenario-simple reflection off an optical *** topology is not without benefit,but it must not be assumed.
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ...
详细信息
We propose a protocol in quantum illumination (QI) leveraging entanglement in discrete-variable states. Our investigation shows that, as M→∞, the M-mode Bell state matches the 6 dB advantage of the two-mode squeezed...
详细信息
We propose a protocol in quantum illumination (QI) leveraging entanglement in discrete-variable states. Our investigation shows that, as M→∞, the M-mode Bell state matches the 6 dB advantage of the two-mode squeezed vacuum in high noise. It also excels in low- and mid-noise conditions, demonstrating that QI's benefits are not restricted to high background noise. Moreover, the protocol benefits from a sequential decision rule, increasing the advantage beyond 6 dB. These findings present an intriguing alternative to continuous-variable states and open different applications for QI using discrete-variable states.
Different paradigms employ server selection to establish a fast connection to end users, thereby reducing the delay associated with exchanging data between mobile users and servers. To efficiently infer the statistics...
详细信息
This study investigates the properties of exciton-polaritons in a two-dimensional(2D)hybrid organic-inorganic perovskite microcavity in the presence of optical Stark *** both steady and dynamic state analyses,strong c...
详细信息
This study investigates the properties of exciton-polaritons in a two-dimensional(2D)hybrid organic-inorganic perovskite microcavity in the presence of optical Stark *** both steady and dynamic state analyses,strong coupling between excitons of perovskite and cavity photons is revealed,indicating the formation of polaritons in the perovskite ***,it is found that an external optical Stark pulse can induce energy shifts of excitons proportional to the pulse intensity,which modifies the dispersion characteristics of the polaritons.
This paper presents a radio frequency fingerprinting identification (RFFI) protocol in wireless links with multi-antenna array transmitters. Multi-antenna systems are widely used in wireless communication systems for ...
详细信息
暂无评论