The paper is concerned with the improvement of the rational representation theory for solving positive-dimensional polynomial systems. The authors simplify the expression of rational representation set proposed by Tan...
详细信息
The paper is concerned with the improvement of the rational representation theory for solving positive-dimensional polynomial systems. The authors simplify the expression of rational representation set proposed by Tan and Zhang(2010), obtain the simplified rational representation with less rational representation sets, and hence reduce the complexity for representing the variety of a positive-dimensional ideal. As an application, the authors compute a "nearly" parametric solution for the SHEPWM problem with a fixed number of switching angles.
Ad-hoc retrieval models with implicit feedback often have problems, e.g., the imbalanced classes in the data set. Too few clicked documents may hurt generalization ability of the models, whereas too many non-clicked d...
详细信息
Model counting is the problem of computing the number of satisfying assignments of a given propositional formula. Although exact model counters can be naturally furnished by most of the knowledge compilation (KC) meth...
详细信息
The vehicle scheduling problem is a typical multi-objective optimization problem. It is a core logistics dispatching problem and the key to realize system optimization. Optimizing vehicle scheduling for relief efforts...
详细信息
With the burgeoning of IT industry, more and more companies and universities concentrate on the scientific evaluation of science-and-engineering students. Existing evaluation strategies typically lie on grades or scor...
详细信息
Automatic knowledge graph construction seeks to build a knowledge graph from unstructured text in a specific domain or cross multiple domains, without human intervention. IEEE ICDM 2019 and ICBK 2019 invited teams fro...
Automatic knowledge graph construction seeks to build a knowledge graph from unstructured text in a specific domain or cross multiple domains, without human intervention. IEEE ICDM 2019 and ICBK 2019 invited teams from both degree-granting institutions and industrial labs to compete in the 2019 knowledge Graph Contest by automatically constructing knowledge graphs in at least two different domains. This article reports the outcomes of the Contest. The participants were expected to build a model to extract knowledge represented as triplets from text data and develop a web application to visualize the triplets. Awards were given to five teams. Their models and key techniques used to construct knowledge graphs are summarized.
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different...
详细信息
Traditional fuzzy C-means clustering algorithm has poor noise immunity and clustering results in image segmentation. To overcome this problem, a novel image clustering algorithm based on SLIC superpixel and transfer l...
详细信息
For each microarray data set, only a small number of genes are beneficial. Due to the high-dimensional problem, gene selection research work remains a challenge. In order to solve the high-dimensional problem, we prop...
详细信息
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System(IDS), it proposes a new hybrid method based on the relationship of feature and spatial corr...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System(IDS), it proposes a new hybrid method based on the relationship of feature and spatial correlation for IDS. The proposed IDS reduces the dimension of network data flow by spatial correlation-based dimension reduction method(SCDR). It improves the effectiveness of intrusion detection, and the negative feedback learning method can also improve the generalization ability of IDS. Experiments show that the method in this paper can improve the detection rate notably and also enhance the detection ability of unknown attacks.
暂无评论