With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influ...
With the research of influence maximization algorithm, many researchers have found that the existing algorithm has the problem of overlapping influence of seed nodes. In order to solve the problem of overlapping influence of seed nodes, this paper proposes an IMCS algorithm based on community structure. Firstly, we divide the community through the central node, and the quality of community division is ensured by defining community fitness and node contribution. Then through the analysis of the community division results, the seed node selects the one with the largest degree. Since most of the nodes activated by seed nodes of different communities also belong to different communities, this method solves the problem of overlapping influence to a certain extent. The experimental results show that the effectiveness of the IMCS algorithm is verified under the real network, cooperative network and artificial network, and the IMCS algorithm has a better effect than IEIR and Degree algorithms in most networks under the IC model.
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in differ...
Given that analysis on the vulnerability of functions is helpful to the detection and improvement of software security, this paper aims to propose an efficient methods to identify the vulnerable nodes (ITVN) in different software by the interdependence of functions. First, the dynamic software execution process was constructed as Software Execution Dependency Network (SEDN) based on Complex network theory. Second, by analyzing the dependency relationship among functions, the algorithm calVulAndScoOfNodes (CVSN) was designed to compute the vulnerability and the affected scope of each node for further analysis. Third, in order to measure the functions vulnerability in the whole software network, the algorithm calVulDegreeOfNodes (CVDN) was put forward to calculate the vulnerable degree of each node. Finally, the Vulnerable Nodes in different software were obtained by ITVN. Experimental results show that the vulnerable nodes selected as important nodes are well-reasoned in software network by testing different software, and the measures are effective for evaluating nodes vulnerability.
Dynamic network research has been a new trend in recent years. Based on the influence of vertex behavior on community structure, this paper studies signed network dynamic community mining. Firstly, the set pair connec...
详细信息
Humans rely increasingly on sensors to address grand challenges and to improve quality of life in the era of digitalization and big data. For ubiquitous sensing, flexible sensors are developed to overcome the limitati...
详细信息
Humans rely increasingly on sensors to address grand challenges and to improve quality of life in the era of digitalization and big data. For ubiquitous sensing, flexible sensors are developed to overcome the limitations of conventional rigid counterparts. Despite rapid advancement in bench-side research over the last decade, the market adoption of flexible sensors remains limited. To ease and to expedite their deployment, here, we identify bottlenecks hindering the maturation of flexible sensors and propose promising solutions. We first analyze continued...challenges in achieving satisfactory sensing performance for real-world applications and then summarize issues in compatible sensor-biology interfaces, followed by brief discussions on powering and connecting sensor networks. Issues en route to commercialization and for sustainable growth of the sector are also analyzed, highlighting environmental concerns and emphasizing nontechnical issues such as business, regulatory, and ethical considerations. Additionally, we look at future intelligent flexible sensors. In proposing a comprehensive roadmap, we hope to steer research efforts towards common goals and to guide coordinated development strategies from disparate communities. Through such collaborative
Friend recommendation is a fundamental service for both social networks and practical applications. The majority of existing friend-recommendation methods utilize user profiles, social relationships, or static post co...
详细信息
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificia...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificial intelligence, virtual reality, high-speed network and digital reading, the concept of "VR" has been applied to more and more industries. The introduction of VReading multi-sensory reading platform will bring new ideas to digital reading industry.
SYVR is a real-time simulation graphic engine focusing on equipment manufacturing. It is based on decades of research works of physics simulations, is able to provide services like real-time simulation for key parts o...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
SYVR is a real-time simulation graphic engine focusing on equipment manufacturing. It is based on decades of research works of physics simulations, is able to provide services like real-time simulation for key parts of devices, large-scale com-plicated situation simulation, virtual experiment, operational training, visualization of concept design and etc., which con-sist of the whole process of virtual manufacturing and simulation. SYVR can provide comprehensive technology support for industrial 3-dimensional data, accelerate applications of VR to all aspects of industry, cut down development costs of equipment manufacturing significantly, highly increase effi-ciency of equipment design, and promote development of equipment manufacturing.
Cloud storage is one of the key services in cloud computing. In order to appeal more users to the cloud storage, free cloud experience is provided to potential users. A registration server is set specially for intenti...
详细信息
Guiding assembly system based on AR is to apply the technol-ogy of Augmented Reality to guide mechanical assembly op-eration and teach or train freshmen. By the means of adapting AR glasses(HoloLens, Magic Leap One et...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
Guiding assembly system based on AR is to apply the technol-ogy of Augmented Reality to guide mechanical assembly op-eration and teach or train freshmen. By the means of adapting AR glasses(HoloLens, Magic Leap One etc.), we use virtual information to guide operating real mechanic. AR operation can achieve better effect than traditional reality training, and make industrial assembly process easier for costumers to un-derstand. It can also decrease losses caused by operational error, therefore increases efficiency safety and productivity.
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and mat...
详细信息
The existing robust collaborative recommendation algorithms have low robustness against PIA and Ao P attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and matrix factorization model. Firstly, the type of shilling attack is identified based on statistical characteristics of attack profiles. Secondly, we devise corresponding unsupervised detection algorithms for standard attack, Ao P and PIA, and the suspicious users and items are flagged. Finally, we devise a robust recommendation algorithm by combining the proposed shilling attack detection algorithm with matrix factorization model, and conduct experiments on the Movie Lens dataset to demonstrate its effectiveness. Experimental results show that the proposed method exhibits good recommendation precision and excellent robustness for shilling attacks of multiple types.
暂无评论