Accompanying increasing competition among the communication industry, maintaining and improving the stability and loyalty of customers has become the key determinant of profitability. In order to prevent the loss of c...
详细信息
Accompanying increasing competition among the communication industry, maintaining and improving the stability and loyalty of customers has become the key determinant of profitability. In order to prevent the loss of customers, we need to identify the stable users by data mining model. Through the evaluation of three models, Random Forest model performs with better robustness. This model can describe and predict most of the stable users in a shorter period of time. Consequently, the result will provide operators with the advantage of adopting reasonable marketing tactics timely.
The precise prediction of bus routes or the arrival time of buses for a traveler can enhance the quality of bus service. However, many social factors influence people's preferences for taking buses. These social f...
详细信息
The training algorithm of classical twin support vector regression (TSVR) can be attributed to the solution of a pair of quadratic programming problems (QPPs) with inequality constraints in the dual ***,this solution ...
详细信息
The training algorithm of classical twin support vector regression (TSVR) can be attributed to the solution of a pair of quadratic programming problems (QPPs) with inequality constraints in the dual ***,this solution is affected by time and memory constraints when dealing with large *** this paper,we present a least squares version for TSVR in the primal space,termed primal least squares TSVR (PLSTSVR).By introducing the least squares method,the inequality constraints of TSVR are transformed into equality ***,we attempt to directly solve the two QPPs with equality constraints in the primal space instead of the dual space;thus,we need only to solve two systems of linear equations instead of two *** results on artificial and benchmark datasets show that PLSTSVR has comparable accuracy to TSVR but with considerably less computational *** further investigate its validity in predicting the opening price of stock.
Routing is a basic service for intelligent environmental monitoring system. However, traditional routing protocols cause unnecessary energy consumption due to the high communication overhead. In this paper, we propose...
详细信息
ISBN:
(纸本)9781479954599
Routing is a basic service for intelligent environmental monitoring system. However, traditional routing protocols cause unnecessary energy consumption due to the high communication overhead. In this paper, we proposed RERP, an energy efficient cluster-based routing protocol for intelligent environmental monitoring system. RERP improves LEACH protocol by limiting the selection range of cluster head. RERP also achieves reasonable cluster head election by considering residual energy, relative density and centroid distance. Simulation results show that RERP can save 54 th percentile energy more than LEACH after 2000 clustering rounds. When the network size is 500, RERP can still guarantee 99.6% nodes alive after 2000 clustering rounds.
Directed diffusion protocol enables data-centric routing for smart home sensor network. However, traditional directed diffusion protocol makes all nodes participating in the routing process. This causes a lot of redun...
详细信息
ISBN:
(纸本)9781479954599
Directed diffusion protocol enables data-centric routing for smart home sensor network. However, traditional directed diffusion protocol makes all nodes participating in the routing process. This causes a lot of redundant data transmission which brings unnecessary energy consumption. In this paper, we proposed LDDP, a location-based directed diffusion routing protocol for smart home sensor network, which reduces the number of nodes involved in data forwarding by room-based partitioning algorithm. Simulation results show that LDDP has better scalability than traditional DDP. LDDP can save 76 th percentile energy when the node number is 200 and the transmission times is 5000. When the network size is 250, LDDP can also brings 40kb/s network throughput gain than traditional DDP.
Given a polygonal region containing a target point (which we assume is the origin), it is not hard to see that there are two points on the perimeter that are antipodal, i.e., whose midpoint is the origin. We prove thr...
详细信息
ISBN:
(纸本)9781450325943
Given a polygonal region containing a target point (which we assume is the origin), it is not hard to see that there are two points on the perimeter that are antipodal, i.e., whose midpoint is the origin. We prove three generalizations of this fact. (1) For any polygon (or any bounded closed region with connected boundary) containing the origin, it is possible to place a given set of weights on the boundary so that their barycenter (center of mass) coincides with the origin, provided that the largest weight does not exceed the sum of the other weights. (2) On the boundary of any 3-dimensional bounded polyhedron containing the origin, there exist three points that form an equilateral triangle centered at the origin. (3) On the 1-skeleton of any 3-dimensional bounded convex polyhedron containing the origin, there exist three points whose center of mass coincides with the origin. Copyright 2014 ACM.
Benefiting from its openness, collaboration and real-time features, Micro blog has become one of the most important news communication media in modern society. However, it is also filled with fake news. Without verifi...
详细信息
ISBN:
(纸本)9781479943012
Benefiting from its openness, collaboration and real-time features, Micro blog has become one of the most important news communication media in modern society. However, it is also filled with fake news. Without verification, such information could spread promptly through social network and result in serious consequences. To evaluate news credibility on Micro blog, we propose a hierarchical propagation model. We detect sub-events within a news event to describe its detailed aspects. Thus, for a news event, a three-layer credibility network consisting of event, sub-events and messages can represent it from different scale and reveal vital information for credibility evaluation. After linking these entities with their semantic and social associations, the credibility value of each entity is propagated on this network to achieve the final evaluation result. By formulating this propagation process as a graph optimization problem, we provide a globally optimal solution with an iterative algorithm. Experiments conducted on two real-world datasets show that the proposed model boosts the accuracy by more than 6% and the F-score by more than 16% over a baseline method.
The high-throughput technologies have led to vast amounts of protein-protein interaction (PPI) data, and a number of approaches based on PPI networks have been proposed for protein function prediction. However, these ...
详细信息
暂无评论