作者:
DONG TianSchool of Mathematics
Key Laboratory of Symbolic Computation and Knowledge Engineering (Ministry of Education) Jilin University
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional impro...
详细信息
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional improvement for it that employs a preprocessing strategy for computing reduced Gr?bner bases associated with tower subsets of given point sets. Experimental results show that the preprocessed Farr-Gao algorithm is more efficient than the classical one.
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** is...
详细信息
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks.
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constr...
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constraints, the state-of-the-art knowledge compilers cannot complete compilation. In this paper, we propose a new encoding scheme of exactly-one constraints. We introduce two-dimensional auxiliary variables (represented as a matrix) to denote the constraint that exactly one of some variables can be assigned as true. The clauses generated by our scheme is significantly less than those generated by three other existing encoding schemes. The experimental results on the exact cover problems show that the encoded CNF formulas generated by our scheme requires less compilation time, compared with the other three coding schemes.
It is well known that when the fitness function is relatively complex, the optimization time cost of the genetic algorithm will be extremely huge. To address this issue, the surrogate model was employed to predict the...
It is well known that when the fitness function is relatively complex, the optimization time cost of the genetic algorithm will be extremely huge. To address this issue, the surrogate model was employed to predict the fitness value of the optimization problem, to reduce the number of actual calculated fitness values. In this paper, BP neural network, the least square method and support vector machine were fused in the genetic algorithm to evaluate partial individuals' fitness. Sufficient benchmark numerical experiments were conducted, and the results proved that the strategy could reduce the calculating counts of fitness function on similar accuracy basis compared with simple genetic algorithm.
This paper demonstrates the equivalence of two classes of D-invariant polynomial subspaces, i.e., these two classes of subspaces are different representations of the breadth-one D-invariant subspace. Moreover, the aut...
详细信息
This paper demonstrates the equivalence of two classes of D-invariant polynomial subspaces, i.e., these two classes of subspaces are different representations of the breadth-one D-invariant subspace. Moreover, the authors solve the discrete approximation problem in ideal interpolation for the breadth-one D-invariant subspace. Namely, the authors find the points, such that the limiting space of the evaluation functionals at these points is the functional space induced by the given D-invariant subspace, as the evaluation points all coalesce at one point.
Software Defined Network (SDN) is a new network construction. But due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in S...
详细信息
Mining causality from text is a complex and crucial natural language understanding task corresponding to the human cognition. Existing studies at its solution can be grouped into two primary categories: feature engine...
详细信息
In recent years, with the rapid development of wireless mobile network and smart phone operating systems, various social software based on wireless Internet has emerged one after another. Current popular social softwa...
详细信息
ISBN:
(纸本)9781510864696
In recent years, with the rapid development of wireless mobile network and smart phone operating systems, various social software based on wireless Internet has emerged one after another. Current popular social software such as QQ and We Chat have become important tools for people to meet new friends. At present, existing social software can recommend other users in the vicinity according to the geographical location of the user. However, this method does not consider the user's interests, hobbies, etc. So that the effectiveness of such a friend recommmendation system is often unsatisfactory. In order to solve the above problems, a personalized friend recommendation system based on geolocation information and user content is designed and developed. In this system, not only the geolocation information of the user is considered, but also the features of the user's published statuses are extracted, aiming to recommend more similar other users to the user. After testing, the effectiveness of the proposed method is verified.
Digital cameras that use Color Filter Arrays (CFA) entail a demosaicking procedure to form full RGB images. As today's camera users generally require images to be viewed instantly, demosaicking algorithms for real...
详细信息
In this paper,the vehicle audio encryption system based on scrambling thought and applied to vehicle-mounted media is *** pseudo random number is generated each time it is encrypted,and it is substituted into the Fibo...
详细信息
ISBN:
(纸本)9781510871076
In this paper,the vehicle audio encryption system based on scrambling thought and applied to vehicle-mounted media is *** pseudo random number is generated each time it is encrypted,and it is substituted into the Fibonacci transform to generate a key with variable *** audio data is divided by the number of pseudo random numbers into the Fibonacci sequence,and is encrypted in permutation *** Fibonacci transform has symmetry and creates an audio file that cannot be parsed and played after the permutation *** the security analysis of encryption algorithm,the audio files of different length are *** key space,anti-attack ability,key sensitivity and other indicators are tested to achieve good *** addition,this algorithm is simple in calculation and can realize the ideal real-time performance in practical application.
暂无评论