As a high dimensional problem, analysis of largescale data sets is a challenging task, where many weakly relevant or redundant features hurt generalization performance of classification models. In order to solve this ...
详细信息
As a high dimensional problem, analysis of largescale data sets is a challenging task, where many weakly relevant or redundant features hurt generalization performance of classification models. In order to solve this problem, many effective feature selection methods have proposed to eliminate redundant features in recent years. However, the comparative performances of these redundant feature detection based methods have not been reported yet, which makes the choice of feature selection method relatively difficult for many real applications. The paper presents a novel comparative study of redundant feature detection based feature selection methods. Experiments on several benchmark data sets demonstrate the comparative performances of some state-of-the-arts methods. Based on the extensive empirical results, the minimum Redundancy-Maximum Relevance (mRMR) method has been found to be the best one among all compared feature selection models.
Web services are widely accepted and used in the e-commerce. Trust plays an important role in selecting one Web service for application among many services satisfying the demand of requesters and trust for Web service...
详细信息
Web pages on the Internet are massive, diverse, heterogeneous and redundant. How to organize and manage them effectively is an urgent problem. In this paper, we propose a method to index web pages and build an index m...
详细信息
Applying the proliferated location-based services (LBS) to social networks has spawned mobile social network (MSN) services that it allows users to discover potential friends around them. In this paper, we focus on th...
详细信息
Applying the proliferated location-based services (LBS) to social networks has spawned mobile social network (MSN) services that it allows users to discover potential friends around them. In this paper, we focus on the problem of location privacy preserving in MSN. Particularly, we propose a location privacy preserving (RPAR) scheme via to repartition anonymous region where the central anonymous location minimizes the traffic between the anonymous server and the LBS server while protecting the privacy of the user location.
We study the throughput and delay scaling laws of the mobile cognitive network. There are n primary users and m secondary users in the primary network and the secondary network, respectively. They are distributed unif...
详细信息
We study the throughput and delay scaling laws of the mobile cognitive network. There are n primary users and m secondary users in the primary network and the secondary network, respectively. They are distributed uniformly and independently on the surface of a unit torus, moving according to the random way-point mobility model (RWMM). The primary users have priority to access the spectrum, and do not alter their protocol in the presence of the secondary network. The secondary users opportunistically use the licensed spectrum when it remains unused. Under the improved 2-hop relay policy, we derive the constant throughput of Θ ( 1 ) per primary source–destination (S–D) pair when the radius of the preservation region r p = Θ ( 1 / m ) . The expected delay scales as Θ ( n / v ( n ) ) , where v ( n ) is the average speed of the primary nodes. Moreover, if the secondary network is denser than the primary network, i.e., m = n γ with γ > 1 , the constant throughput of Θ ( 1 ) per secondary S–D pair and the expected delay of Θ ( m / v ( m ) ) can be derived surprisingly when the radius of the avoidance region r s = Θ ( 1 / n ) and r p = Θ ( 1 / m ) , where v ( m ) is the average speed of the secondary nodes.
Optimal assignment of a meta-task in heterogeneous computingsystems is NP-complete in the general case. Therefore, heuristic approaches must be employed to find good solutions within a reasonable time. We propose a n...
Optimal assignment of a meta-task in heterogeneous computingsystems is NP-complete in the general case. Therefore, heuristic approaches must be employed to find good solutions within a reasonable time. We propose a novel discrete particle swarm optimization (DPSO) algorithm for this problem. Firstly, to make particle swarm optimization algorithm more suitable for solving task assignment problems, particles are represented as integer vectors and a new position update method is developed based on discrete domain. Secondly, an effective variable neighborhood descent algorithm is applied to emphasize exploitation. In addition, migration mechanism is introduced with the hope to escape from possible local optimum and to balance the exploration and exploitation. Computational simulations and comparisons based on a set of benchmark instances indicate that the proposed DPSO algorithm is a viable approach for the task assignment problem.
It is challenging to design a secure recommendation system on the Internet which can help users to select their favorite products as less privacy leaked as possible. In this paper, we present a hybrid filtrations reco...
详细信息
It is challenging to design a secure recommendation system on the Internet which can help users to select their favorite products as less privacy leaked as possible. In this paper, we present a hybrid filtrations recommendation system based on privacy preserving in edge computing (HFRS-PP), which can prevent the users’ privacy information from being leaked via the merits of edge computing in the process of computing and ensure the real-time, accuracy and stability of the query results. Particularly, we propose a privacy-preserving recommendation algorithm to obtain the desired results for the end users through hybrid filtrations. The filtration-rough set theory algorithm is given to distinguish the valid reviews from spam reviews for the next filtration.
5G technology is constrained by its higher frequency band and smaller coverage area, which leads to the need for operators to use technologies such as small cell base stations to increase the density of base station d...
详细信息
Vehicle detection in SAR image is attractive field. High moments included numerous information is proposed to exploit in the field. It not only restrains Gaussian noise automatically, but also suppresses non-gaussian ...
详细信息
Vehicle detection in SAR image is attractive field. High moments included numerous information is proposed to exploit in the field. It not only restrains Gaussian noise automatically, but also suppresses non-gaussian noise. Man-made targets in are different from the background clutter. Moreover, the influence of the shadow about man-made targets is reduced in the algorithm of high moments. We utilize high moments to avoid to analyst the complex scatter theory. By analyzing the relevent theory and practical calculated method of high order moments, we compare the difference of probability of detection between the target chip and clutter chip to achieve the goal of detection. Through processing lots of actual SAR data which is added different kinds of noise, we compare the performance between high order moments and low-order moments method.
Compared to the traditional SAR imaging algorithm, Back Projection(BP) algorithm is an accurate point-by-point imaging radar algorithm based on time-domain, with simple principle and without any approximation error in...
详细信息
ISBN:
(纸本)9781849199940
Compared to the traditional SAR imaging algorithm, Back Projection(BP) algorithm is an accurate point-by-point imaging radar algorithm based on time-domain, with simple principle and without any approximation error in the imaging process. However, because of intensive computation and low efficiency, it's a new challengetostorage to capacity, throughput and processing ability of DSPs, a single DSP is not enough to meet these demands. So a parallel implementation method of BP algorithm based on TMS320C6678 DSP is proposed in this *** put forward a large point FFT multi-core parallel processing method on 2/4/8 cores what is frequently used in BP algorithm, and a multi-core synchronization method based on distributed memory. Finally using the measured data, we verify the parallel method can greatly enhance the multi-core parallelism, and the real-time performance of BP algorithm has been significantly improved.
暂无评论