The social network is a main tunnel of rumor spreading. Previous studies concentrated on a static rumor spreading. The content of the rumor is invariable during the whole spreading process. Indeed, the rumor evolves c...
详细信息
The social network is a main tunnel of rumor spreading. Previous studies concentrated on a static rumor spreading. The content of the rumor is invariable during the whole spreading process. Indeed, the rumor evolves constantly in its spreading process, which grows shorter, more concise, more easily grasped, and told. In an early psychological experiment, researchers found about 70% of details in a rumor were lost in the first six mouth-to-mouth transmissions. Based on these observations, we investigate rumor spreading on social networks, where the content of the rumor is modified by the individuals with a certain probability. In the scenario, they have two choices, to forward or to modify. As a forwarder, an individual disseminates the rumor directly to their neighbors. As a modifier, conversely, an individual revises the rumor before spreading it out. When the rumor spreads on the social networks, for instance, scale-free networks and small-world networks, the majority of individuals actually are infected by the multirevised version of the rumor, if the modifiers dominate the networks. The individuals with more social connections have a higher probability to receive the original rumor. Our observation indicates that the original rumor may lose its influence in the spreading process. Similarly, a true information may turn out to be a rumor as well. Our result suggests the rumor evolution should not be a negligible question, which may provide a better understanding of the generation and destruction of a rumor.
With the development of the Internet, user-generated data has been growing tremendously in Web 2.0 era. Facing such a big volume of resources in folksonomy, people need a method of fast exploration and indexing to fin...
详细信息
With the development of the Internet, user-generated data has been growing tremendously in Web 2.0 era. Facing such a big volume of resources in folksonomy, people need a method of fast exploration and indexing to find their demanded data. To achieve this goal, contextual information is indispensable and valuable to understand user preference and purpose. In sociolinguistics, context can be mainly categorized as verbal context and social context. Comparing with verbal context, social context not only requires domain knowledge to pre-define contextual attributes but also acquires additional data from users. However, there is no research of addressing irrelevant contextual factors for verbal context model so far. The dominating set from verbal context proposed in this paper is to fill this blank. We present the verbal context in folksonomy to capture the user intention, and propose a dominating set discovering method for this verbal context model to prune the irrelevant contextual factors and keep the major characteristics at the same time. Furthermore, the experiments, which are conducted on a public data set, show that the proposed method gives convincing results.
作者:
Bin LiuXiaolong WangSchool of Computer Science and Technology
Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China School of Computer Science and Technology
Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China
Protein remote homology detection is a key problem in bioinformatics. Currently, the discriminative methods, such as Support Vector Machine (SVM), can achieve the best performance. The most efficient approach to impro...
详细信息
Protein remote homology detection is a key problem in bioinformatics. Currently, the discriminative methods, such as Support Vector Machine (SVM), can achieve the best performance. The most efficient approach to improve the performance of the SVM-based methods is to find a general protein representation method that is able to convert proteins with different lengths into fixed length vectors and captures the different properties of the proteins for the discrimination. The bottleneck of designing the protein representation method is that native proteins have different lengths. Motivated by the success of the pseudo amino acid composition (PseAAC) proposed by Chou, we applied this approach for protein remote homology detection. Some new indices derived from the amino acid index (AAIndex) database are incorporated into the PseAAC to improve the generalization ability of this method. Our experiments on a well-known benchmark show this method achieves superior or comparable performance with current state-of-the-art methods.
Aim:φC31 integrase mediates site-specific recombination between two short sequences, attP and attB, in phage and bacterial genomes, which is a promising tool in gene regulation-based therapy since the zinc finger str...
详细信息
Aim:φC31 integrase mediates site-specific recombination between two short sequences, attP and attB, in phage and bacterial genomes, which is a promising tool in gene regulation-based therapy since the zinc finger structure is probably the DNA recognizing domain that can further be engineered. The aim of this study was to screen potential pseudo att sites of (I)C31 integrase in the human genome, and evaluate the risks of its application in human gene therapy. Methods: TFBS (transcription factor binding sites) were found on the basis of reported pseudo att sites using multiple motif-finding tools, including AlignACE, BioProspector, Consensus, MEME, and Weeder. The human genome with the proposed motif was scanned to find the potential pseudo att sites ofφC31 integrase. Results: The possible recognition motif ofφC31 integrase was identified, which was composed of two co-occurrence conserved elements that were reverse complement to each other flanking the core sequence TTG. In the human genome, a total of 27924 potential pseudo att sites ofφC31 integrase were found, which were distributed in each human chromosome with high-risk specificity values in the chromosomes 16, 17, and 19. When the risks of the sites were evaluate more rigorously, 53hits were discovered, and some of them were just the vital functional genes or regulatory regions, such as ACYP2, AKR1B1, DUSP4, etc. Conclusion: The results provide clues for more comprehensive evaluation of the risks of usingφC31 integrase in human gene therapy and for drug discovery.
Neural network language models, or continuous-space language models (CSLMs), have been shown to improve the performance of statistical machine translation (SMT) when they are used for reranking n-best translations. Ho...
详细信息
A particle swarm optimization (PSO)-based automatic system to determine the number of optimal band sets and corresponding bands is proposed. A simple searching criterion function, called minimum estimated abundance co...
详细信息
In this paper,we find that Property P can be generalized to characterize the solvability of a kind of networks with any number of sources,thus partially answering the open problem as to whether there are properties si...
详细信息
In this paper,we find that Property P can be generalized to characterize the solvability of a kind of networks with any number of sources,thus partially answering the open problem as to whether there are properties similar to Property P to characterize the solvability of some *** an application,for a given integer n,we construct such a solvable network that has no solvable solution if its alphabet size is less than n.
An AAR (algebraic attack resistant) Boolean function is considered having good capability against both classical and fast algebraic attacks. However, AAR is too hard to achieve. This paper studies the protection again...
详细信息
In this paper, we propose to rerank the image retrieval results using a novel method which can be fitted to both objects classes and scenes classes. We first introduce the two methods: Exemplar model and Saliency Map ...
详细信息
暂无评论