作者:
Amala, K.J.Rajeswari, D.School of Computing
College of Engineering and Technology Srm Institute of Science and Technology Department of Data Science and Business Systems Kattankulathur India
Feature Selection (FS) is essential for optimizing Learning to Rank (LTR) models by determining the vital choice of attributes from a complex dataset. This study examines feature selection strategies within the framew...
详细信息
Predictive Business Process Monitoring(PBPM)is a significant research area in Business Process Management(BPM)aimed at accurately forecasting future behavioral *** present,deep learning methods are widely cited in PBP...
详细信息
Predictive Business Process Monitoring(PBPM)is a significant research area in Business Process Management(BPM)aimed at accurately forecasting future behavioral *** present,deep learning methods are widely cited in PBPM research,but no method has been effective in fusing data information into the control flow for multi-perspective process ***,this paper proposes a process prediction method based on the hierarchical BERT and multi-perspective data ***,the first layer BERT network learns the correlations between different category attribute ***,the attribute data is integrated into a weighted event-level feature vector and input into the second layer BERT network to learn the impact and priority relationship of each event on future predicted ***,the multi-head attention mechanism within the framework is visualized for analysis,helping to understand the decision-making logic of the framework and providing visual ***,experimental results show that the predictive accuracy of the framework surpasses the current state-of-the-art research methods and significantly enhances the predictive performance of BPM.
In this fast-paced Digital Age, Natural Language Processing (NLP) can prove beneficial in consuming quality information efficiently. With the ever-growing number of learning resources, it is becoming onerous for stude...
详细信息
The paper is concerned with a class of elliptic equation with critical exponent and Dipole *** precisely,we make use of the refined Sobolev inequality with Morrey norm to obtain the existence and decay properties of n...
详细信息
The paper is concerned with a class of elliptic equation with critical exponent and Dipole *** precisely,we make use of the refined Sobolev inequality with Morrey norm to obtain the existence and decay properties of nonnegative radial ground state solutions.
Online job advertisements on various job portals or websites have become the most popular way for people to find potential career opportunities ***,the majority of these job sites are limited to offering fundamental f...
详细信息
Online job advertisements on various job portals or websites have become the most popular way for people to find potential career opportunities ***,the majority of these job sites are limited to offering fundamental filters such as job titles,keywords,and compensation *** often poses a challenge for job seekers in efficiently identifying relevant job advertisements that align with their unique skill sets amidst a vast sea of ***,we propose well-coordinated visualizations to provide job seekers with three levels of details of job information:a skill-job overview visualizes skill sets,employment posts as well as relationships between them with a hierarchical visualization design;a post exploration view leverages an augmented radar-chart glyph to represent job posts and further facilitates users’swift comprehension of the pertinent skills necessitated by respective positions;a post detail view lists the specifics of selected job posts for profound analysis and *** using a real-world recruitment advertisement dataset collected from 51Job,one of the largest job websites in China,we conducted two case studies and user interviews to evaluate *** results demonstrated the usefulness and effectiveness of our approach.
Many well-known and effective anomaly detection methods assume that a reasonable decision boundary has a hypersphere shape, which however is difficult to obtain in practice and is not sufficiently compact, especially ...
详细信息
In this paper,we investigate the limiting spectral distribution of a high-dimensional Kendall’s rank correlation *** underlying population is allowed to have a general dependence *** result no longer follows the gene...
详细信息
In this paper,we investigate the limiting spectral distribution of a high-dimensional Kendall’s rank correlation *** underlying population is allowed to have a general dependence *** result no longer follows the generalized Marcenko-Pastur law,which is brand *** is the first result on rank correlation matrices with *** applications,we study Kendall’s rank correlation matrix for multivariate normal distributions with a general covariance *** these results,we further gain insights into Kendall’s rank correlation matrix and its connections with the sample covariance/correlation matrix.
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t...
详细信息
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is to automate adaptive network defense, which is however a difficult problem. As a first step towards automation, we propose investigating how to attain semi-automated adaptive network defense(SAND). We propose an approach extending the architecture of software-defined networking, which is centered on providing defenders with the capability to program the generation and deployment of dynamic defense rules enforced by network defense tools. We present the design and implementation of SAND, as well as the evaluation of the prototype implementation. Experimental results show that SAND can achieve agile and effective dynamic adaptations of defense rules(less than 15 ms on average for each operation), while only incurring a small performance overhead.
1 Introduction Emerging byte-addressable storage technologies,such as NVM(Non-Volatile Memory),provide a more cost-effective and larger-capacity alternative to DRAM(Dynamic Random Access Memory)[1],presenting new oppo...
详细信息
1 Introduction Emerging byte-addressable storage technologies,such as NVM(Non-Volatile Memory),provide a more cost-effective and larger-capacity alternative to DRAM(Dynamic Random Access Memory)[1],presenting new opportunities to address the high cost,limited capacity,and volatility of in-memory key-value(KV)*** efforts have been dedicated to redesigning conventional structures on ***,they were challenged by the substantial engineering cost and increased complexity to be integrated into existing ***,a general framework to apply existing indexes to KV stores on NVM becomes more attractive[2].
We present the vision of LivedataLab and discuss the new research directions and application opportunities it opens up. LivedataLab is envisioned to be a cloud-based open lab infrastructure where research, education, ...
详细信息
暂无评论