Attribute selection is an effective approach to improve the inference efficiency of data-based schedulingstrategies system and many researchers have studied the attribute selection based on computational intelligence ...
详细信息
Attribute selection is an effective approach to improve the inference efficiency of data-based schedulingstrategies system and many researchers have studied the attribute selection based on computational intelligence *** computational intelligence methods,concept lattice,an important tool for knowledge extraction andanalysis,has nature advantages in attribute
Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and fo...
详细信息
Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and follow a power law distribution; hence inferring unknown trust relations attracts increasing attention in recent years. Social theories are frameworks of empirical evidence used to study and interpret social phenomena from a sociological perspective, while social networks reflect the correlations of users in real world; hence, making the principle, rules, ideas and methods of social theories into the analysis of social networks brings new opportunities for trust prediction. In this paper, we investigate how to exploit homophily and social status in trust prediction by modeling social theories. We first give several methods to compute homophily coe?cient and status coe?cient, then provide a principled way to model trust prediction mathe-matically, and propose a novel framework, hsTrust, which incorporates homophily theory and status theory. Experimental results on real-world datasets demonstrate the effectiveness of the proposed framework. Further experiments are conducted to understand the importance of homophily theory and status theory in trust prediction.
Measuring word semantic similarity is a generic problem with a broad range of applications such as ontology mapping, computational linguistics and artificial intelligence. Previous approaches to computing word semanti...
详细信息
Measuring word semantic similarity is a generic problem with a broad range of applications such as ontology mapping, computational linguistics and artificial intelligence. Previous approaches to computing word semantic similarity did not consider concept occurrence frequency and word’s sense number. This paper introduced Hyponymy graph, and based on which proposed a novel word semantic similarity model. For two words to be compared, we first retrieve their related concepts; then produce lowest common ancestor matrix and distance matrix between concepts; finally calculate distance-based similarity and information-based similarity, which are integrated to get final semantic similarity. The main contribution of our method is that both concept occurrence frequency and word’s sense number are taken into account. This similarity measurement more closely fits with human rating and effectively simulates human thinking process. Our experimental results on benchmark dataset M&C and R&G with Word Net2.1 as platform demonstrate roughly 0.9%–1.2%improvements over existing best approaches.
Many researchers have begun to study signed networks which are widely existed in real world. In the signed network, the links are labeled the positive or negative sign to represent the active or passive relation betwe...
详细信息
Many researchers have begun to study signed networks which are widely existed in real world. In the signed network, the links are labeled the positive or negative sign to represent the active or passive relation between individuals, such as trusted or distrusted relation in social networks. Communities mining is still a great challenge to the domain of signed networks because of negative links. Unlike communities of unsigned networks, positive links mainly occur in the communities and negative links tend to occur between the communities in the signed networks. Nowadays, many methods which are based on global search for signed network community have been raised, and most of these methods require the global information at each iteration. Besides, determining the number of communities is an important problem for current algorithm for the lack of priori knowledge. To address above problems, a novel community detection method based on local information, is proposed for signed networks in this paper. The proposed method mainly includes two steps. In the first step, the number of communities is determined in terms of the centrality of nodes. In the second step, the local objective function is optimized by the local information of nodes, so the global objective function can also be optimized indirectly. Finally, the communities in signed networks are efficiently found. To validate the proposed method, the comparisons are made with other methods in the synthetic and real signed networks. The experimental results indicate that communities in signed networks can be efficiently found by the proposed method.
This paper proposes a novel video face recognition method based on the convex hull model of kernel subspace sample selection. This method treats each video as an image set. Each image is represented as a point in the ...
详细信息
Link prediction is essential to both research areas and practical applications. In order to make full use of information of the network, we proposed a new method to predict links in the social network. Firstly, we ext...
Link prediction is essential to both research areas and practical applications. In order to make full use of information of the network, we proposed a new method to predict links in the social network. Firstly, we extracted topological information and attributes of nodes in the social network. Secondly, we integrated them into feature vectors. Finally, we used XGB classifier to predict links using feature vectors. Through expanding information source, experiments on a co-authorship network suggest that our method can improve the accuracy of link prediction significantly.
In order to solve the problem that multi-thresholding segmentation spends too much time finding the optimal solution in medical image segmentation, Otsu multi-thresholding based on dynamic combination of genetic algor...
详细信息
Malaria is one of the most serious diseases in the world, which is densely distributed in poverty and remote areas. In the prevention and control of malaria, active surveillance is more efficient than passive surveill...
详细信息
A novel method to measure the graph similarity is proposed, where the labels, in-degrees, and out-degrees of the vertices in the graph are comprehensively considered in order to conquer the high complexity and informa...
详细信息
Locating the source of diffusion is a challenging problem in complex networks and has great practical significance for restraining rumors propagation and controlling epidemics spreading. An efficient locating method s...
详细信息
ISBN:
(纸本)9781509006243
Locating the source of diffusion is a challenging problem in complex networks and has great practical significance for restraining rumors propagation and controlling epidemics spreading. An efficient locating method should have a higher locating accuracy with the minimum required information. Although existing locating methods based on observers consider the time delays of edges, they compute the time delays based on the shortest path, which may differ from the actual diffusion process. Moreover, the higher locating accuracy of traditional method with observers has a great dependence on the assumption that the propagation delays along edges follow a definite distribution such as the Gaussian distribution. In order to solve these shortcomings, this paper proposes a Physarum-inspired method to locate the diffusion source that is independence of the distribution of propagation delays. Our method quantifies the nutrient transportation process in the adaptive network evolved by Physarum, which is used to simulate the information or epidemic diffusion routes in a social network. Simulation results on various benchmark networks show that our method has a better performance in terms of error distance than that of Gaussian method without assuming the definite distribution of time delays. Together with the advantage that our method does not require the sender information of observers compared with existing methods, our method allows for a wider range of applications in the real-world networks.
暂无评论