The rapid development of the Internet has brought convenience to people and has also produced the problem of 'information overload'. In view of the traditional collaborative filtering algorithm facing some bot...
The rapid development of the Internet has brought convenience to people and has also produced the problem of 'information overload'. In view of the traditional collaborative filtering algorithm facing some bottlenecks to be solved, this study proposes a collaborative filtering algorithm that combines similarity and trust. First of all, in view of the large deviation of traditional similarity calculation and prediction of user ratings, this study proposes an optimized Pearson correlation coefficient calculation method; secondly, the trust relationship is established based on the user's rating of the common project, and the trust relationship between users who do not have a direct trust relationship is established through the transfer of trust; then find the nearest neighbor set of the target user through the fusion of user similarity and trust; finally, the item is scored and predicted to generate a recommendation list. Experimental results show that the algorithm proposed in this study can effectively improve the accuracy of recommendation.
As the feature size of CMOS transistors scales down, single event transient(SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. Howeve...
As the feature size of CMOS transistors scales down, single event transient(SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However, it is difficult to consider numerous factors. We present a new approach for analyzing the SET pulses propagation probabilities(SPPs). It considers all masking effects and uses SET pulses propagation probabilities matrices(SPPMs) to represent the SPPs in current cycle. Based on the matrix union operations, the SPPs in consecutive cycles can be calculated. Experimental results show that our approach is practicable and efficient.
Pattern matching(or string matching) is an essential task in computer science, especially in sequential pattern mining, since pattern matching methods can be used to calculate the support(or the number of occurrences)...
详细信息
Pattern matching(or string matching) is an essential task in computer science, especially in sequential pattern mining, since pattern matching methods can be used to calculate the support(or the number of occurrences) of a pattern and then to determine whether the pattern is frequent or not. A state-of-the-art sequential pattern mining with gap constraints(or flexible wildcards) uses the number of non-overlapping occurrences to denote the frequency of a pattern. Non-overlapping means that any two occurrences cannot use the same character of the sequence at the same position of the pattern. In this paper, we investigate strict pattern matching under the non-overlapping condition. We show that the problem is in P at first. Then we propose an algorithm, called NETLAP-Best, which uses Nettree structure. NETLAP-Best transforms the pattern matching problem into a Nettree and iterates to find the rightmost root-leaf path, to prune the useless nodes in the Nettree after removing the rightmost root-leaf path. We show that NETLAP-Best is a complete algorithm and analyse the time and space complexities of the algorithm. Extensive experimental results demonstrate the correctness and efficiency of NETLAP-Best.
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data;...
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data;secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids;finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.
Lottery is a game with many people's dreams. But corruptions of lottery centers make the lottery unfair. To address this unfair issue, fair lottery schemes have been studied for several years. In these schemes, de...
详细信息
Lottery is a game with many people's dreams. But corruptions of lottery centers make the lottery unfair. To address this unfair issue, fair lottery schemes have been studied for several years. In these schemes, delay functions or aggregation protocols can be used to generate the winning numbers fairly. However, to the best of our knowledge, none of the existing schemes can achieve the winning number generated randomly, while the randomness can be verified fairly. In this article, we first propose a [B]lockchain based sm[a]rt co[n]tract for [F]air and [E]fficient [L]ottery (BanFEL) scheme. We further present a winning number random generation smart contract, by which players submit the purchased numbers and the non-tampering property is protected. Security analysis and experiments show that the fairness of BanFEL is protected better than the existing works. Meanwhile, the verification cost of this scheme are at least 0.03s lower than the traditional Grumbach's scheme between 1000 and 10000 players.
In this work, we investigate how to speed up machine learning tasks based on quantum computation. We show an important classifier in machine learning, the twin support vector machine, can be exponentially speeded up o...
详细信息
To address the problem of unstable training and poor accuracy in image classification algorithms based on generative adversarial networks (GAN), a novel sensor network structure for classification processing using aux...
详细信息
Online Distance Education (ODE) provides massive course videos of various specialties for students across the country to learn professional knowledge anytime and anywhere. Analyzing the utilization of these videos fro...
详细信息
—The performance of video saliency estimation techniques has achieved significant advances along with the rapid development of Convolutional Neural Networks (CNNs). However, devices like cameras and drones may have l...
详细信息
Indoor 3D mapping provides a useful three-dimensional structure via an indoor map for many applications. To acquire highly efficient and relatively accurate mapping for large-scale GPS/GNSS-denied scene, we present an...
详细信息
暂无评论