UsersontheInter*** reputation system that processes ratings to provide recommendations. The rating aggregation process is a main part of reputation systems to produce global opinions about the product quality. Naive m...
UsersontheInter*** reputation system that processes ratings to provide recommendations. The rating aggregation process is a main part of reputation systems to produce global opinions about the product quality. Naive methods that are frequently used do not consider consumer profiles in their calculations and cannot discover unfair ratings and trends emerging in new ratings. Other sophisticated rating aggregation methods that use a weighted average technique focus on one or a few aspects of consumers′profile data. This paper proposes a new reputation system using machine learning to predict reliability of consumers from their profile. In particular, we construct a new consumer profile dataset by extracting a set of factors that have a great impact on consumer reliability, which serve as an input to machine learning algorithms. The predicted weight is then integrated with a weighted average method to compute product reputation score. The proposed model has been evaluated over three MovieLens benchmarking datasets, using 10-folds cross validation. Furthermore, the performance of the proposed model has been compared to previous published rating aggregation models. The obtained results were promising which suggest that the proposed approach could be a potential solution for reputation systems. The results of the comparison demonstrated the accuracy of our models. Finally, the proposed approach can be integrated with online recommendation systems to provide better purchasing recommendations and facilitate user experience on online shopping markets.
Deep image clustering approaches typically use autoencoder architectures to learn compressed latent representations suitable for clustering tasks. However, they do not effectively regulate the latent space during trai...
详细信息
Owing to flexible management and low overhead, wireless physical layer security (PLS) has been applied to support many critical applications (e.g., data dissemination) of unmanned aerial vehicles (UAVs)-based mobile c...
详细信息
Owing to flexible management and low overhead, wireless physical layer security (PLS) has been applied to support many critical applications (e.g., data dissemination) of unmanned aerial vehicles (UAVs)-based mobile communication networks in emergency scenarios. Although the impact of static network scenarios or receiver mobility on PLS has been well studied, there is no much work that studies the impact of UAV-based transmitter mobility on PLS. To fill this gap, in this paper, we investigate PLS of a scenario, where a random mobile UAV-based transmitter transmits information to a static ground entity under Rayleigh fading channel. More specifically, we consider a communication system, in which a mobile UAV hovers over a region to collect information and then disseminates this information to a static ground network entity in a confidential manner under the presence of an eavesdropper. Because of popularity and practicality, the UAV is assumed to hover following the random way point (RWP) mobility model. We investigate the secrecy characteristics of the UAV under steady running state in terms of ergodic secrecy capacity (ESC), positive secrecy capacity probability (PSCP) and secrecy outage probability (SOP) for the communication between the UAV and the receiver. We then investigate the secrecy performance of the proposed system while considering the pause time of the RWP mobility model adopted by the UAV. We further extend our proposed theoretical model to other realistic scenarios, including the presence of multiple cooperative and non-cooperative eavesdroppers, and study the PSCP and SOP metrics of the corresponding system. Furthermore, we propose three types of secrecy improvement strategies for the considered communication model. We strike a good trade-off between the secrecy improvement and transmit outage probability. Extensive simulations have been conducted to validate our theoretical analysis as well as the effectiveness of the proposed secrecy improvement s
In recent years, the proliferation of complex applications has led to the emergence of microservices architecture as the preferred approach for developing largescale applications. Consequently, numerous design pattern...
In recent years, the proliferation of complex applications has led to the emergence of microservices architecture as the preferred approach for developing largescale applications. Consequently, numerous design patterns for microservice communication have evolved, with service orchestration gaining widespread acceptance as a standard solution in recent *** study delves into design patterns for microservice data consistency and develops the service orchestration library, Anser-Saga. This library enables the creation of backups and restart points of distributed transaction states, ensuring eventual data consistency between microservice endpoints. Furthermore, it guarantees that our orchestrator can store, compensate for, and restart the orchestration process in case of an unexpected failure, ensuring transaction integrity. We conducted experiments involving actual microservice invocations to evaluate the availability and performance of microservices. The findings revealed that the Anser-Saga library demonstrated superior performance compared to the DTM solution.
Sustainable agriculture plays a crucial role in ensuring world food security for consumers. A critical challenge faced by sustainable precision agriculture is weed growth, as weeds share essential resources with the c...
Scrum is an incremental, interactive agile framework widely used to develop practical problems; the Scrum team focuses on achieving a common goal each cycle, "Sprint Goal" instead of the traditional sequenti...
Scrum is an incremental, interactive agile framework widely used to develop practical problems; the Scrum team focuses on achieving a common goal each cycle, "Sprint Goal" instead of the traditional sequential technique for delivering products. Although many organizations are adopting Scrum, it is still following the traditional manual approaches. Even though many tools are available in the market to facilitate project management and Scrum master tasks, the support is still limited and lacks the utilization of Artificial Intelligence science. This study focuses on integrating the Scrum framework with Artificial Intelligence to build a predicting model that can assist project management "in particular the Scrum master" to predict the achievement of the Scrum Team per Sprint using Story Points; this prediction is built based on several factors that can affect the burndown charts per Sprint.
We introduce a computational snapshot hyperspectral imager for benchtop microscopy. The compact device uses a diffuser and spectral filter array to multiplex spatio-spectral information into a 2D measurement, then rec...
详细信息
Survivors of domestic abuse face significant challenges securing recovery resources, such as housing, mental health care, and social connections. Accessing these resources requires survivors to disclose their status a...
详细信息
ISBN:
(数字)9798350378931
ISBN:
(纸本)9798350378948
Survivors of domestic abuse face significant challenges securing recovery resources, such as housing, mental health care, and social connections. Accessing these resources requires survivors to disclose their status as survivors of domestic abuse; a process that can be traumatic and emotionally burdensome. In this work, we consider how social robots might help domestic abuse survivors to address challenges surrounding self-disclosure. To do so, we conducted a three-session co-design workshop involving 8 participants from a domestic abuse shelter. Our results provide three key contributions: (1) new insights into the benefits and barriers to self-disclosure; (2) new insights into the ways that social robots can help survivors to better achieve those benefits and overcome those barriers before, during, and after disclosure, including key design recommendations associated with each of these phases; and (3) observations into how a trauma-informed computing perspective may enable more effective design work in Human-Robot Interaction.
Supporting vehicular emergency applications requires fast access to infrastructure so vehicles can call for help. Because of their environment's poor wireless qualities, vehicle-infrastructure communication paths ...
详细信息
Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration *** most of these applications,the network is composed of several sensor nodes deployed at different depths in th...
详细信息
Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration *** most of these applications,the network is composed of several sensor nodes deployed at different depths in the *** nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface level;these nodes need multihop communication facilitated by a suitable routing *** this research work,a Cluster-based Cooperative Energy Efficient Routing(CEER)mechanism for UWSNs is proposed to overcome the shortcomings of the Co-UWSN and LEACH *** optimal role of clustering and cooperation provides load balancing and improves the network *** simulation results using MATLAB show better performance of CEER routing protocol in terms of various parameters as compared to Co-UWSN routing protocol,i.e.,the average end-to-end delay of CEER was 17.39,Co-UWSN was 55.819 and LEACH was *** addition,the average total energy consumption of CEER was 9.273,Co-UWSN was 12.198,and LEACH was *** packet delivery ratio of CEER was 53.955,CO-UWSN was 42.047,and LEACH was *** stability period CEER was 130.9,CO-UWSN was 129.3,and LEACH was *** obtained results maximized the lifetime and improved the overall performance of the CEER routing protocol.
暂无评论