For each microarray data set, only a small number of genes are beneficial. Due to the high-dimensional problem, gene selection research work remains a challenge. In order to solve the high-dimensional problem, we prop...
详细信息
The rapid development of cyber-physical systems(CPS)had a tremendous impact on human behavior and *** human involvement,CPS has naturally evolved into cyberphysical social systems(CPSS)[1].The top five technology brea...
详细信息
The rapid development of cyber-physical systems(CPS)had a tremendous impact on human behavior and *** human involvement,CPS has naturally evolved into cyberphysical social systems(CPSS)[1].The top five technology breakthroughs of 2013 were closely related to CPSS and peripherals according to Mc Kinsey’s report[2].
In order to generate a report for an enterprise where there is neither the API supporting from their existing website systems nor the granted database access rights approval, a daily business report generator system b...
In order to generate a report for an enterprise where there is neither the API supporting from their existing website systems nor the granted database access rights approval, a daily business report generator system based on web scraping with k nearest neighbor (kNN) classification algorithm is proposed in this paper. It covers the web crawler technology that is to access existing website system and extract business data. The kNN algorithm is applied to identify the verification code on the login page, and the brief daily report generating in a spread-sheet style grid. Compared with some OCR engine for image recognition, the system in Python can automatically generate the brief daily business reports by the kNN algorithm, which is better than some library with default training set on validating the verification code.
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** is...
详细信息
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks.
作者:
DONG TianSchool of Mathematics
Key Laboratory of Symbolic Computation and Knowledge Engineering (Ministry of Education) Jilin University
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional impro...
详细信息
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional improvement for it that employs a preprocessing strategy for computing reduced Gr?bner bases associated with tower subsets of given point sets. Experimental results show that the preprocessed Farr-Gao algorithm is more efficient than the classical one.
This paper demonstrates the equivalence of two classes of D-invariant polynomial subspaces, i.e., these two classes of subspaces are different representations of the breadth-one D-invariant subspace. Moreover, the aut...
详细信息
This paper demonstrates the equivalence of two classes of D-invariant polynomial subspaces, i.e., these two classes of subspaces are different representations of the breadth-one D-invariant subspace. Moreover, the authors solve the discrete approximation problem in ideal interpolation for the breadth-one D-invariant subspace. Namely, the authors find the points, such that the limiting space of the evaluation functionals at these points is the functional space induced by the given D-invariant subspace, as the evaluation points all coalesce at one point.
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constr...
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constraints, the state-of-the-art knowledge compilers cannot complete compilation. In this paper, we propose a new encoding scheme of exactly-one constraints. We introduce two-dimensional auxiliary variables (represented as a matrix) to denote the constraint that exactly one of some variables can be assigned as true. The clauses generated by our scheme is significantly less than those generated by three other existing encoding schemes. The experimental results on the exact cover problems show that the encoded CNF formulas generated by our scheme requires less compilation time, compared with the other three coding schemes.
Software Defined Network (SDN) is a new network construction. But due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in S...
详细信息
The vehicles' driving safety plays an important role in the transportation safety's development, and it's a necessary requirement in intelligent transportation and intelligent vehicle. The point that is su...
详细信息
ISBN:
(纸本)9781510838451
The vehicles' driving safety plays an important role in the transportation safety's development, and it's a necessary requirement in intelligent transportation and intelligent vehicle. The point that is suggested in this paper is that vehicles' collision warning system which is based on computer vision, and the system is built on computer vision, pattern recognition, machine learning and some other artificial intelligent theory and techniques, discerning the vehicles which is in front of your vehicle and measure the security range, warning the possible danger timely to make sure your drive safe. We use the characteristic which is called haar of the samples to train in the classifier to get a cascaded classifier named Boosted, loading the classifier and image of the vehicles marked and calculating the distance and relative speed. In the last, we do a lot of system simulation experiments, verifying the accuracy and the effectiveness of the system from vehicle outline detection results and safe vehicle determination.
暂无评论