首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
Collaborative Filtering (CF) is a commonly used technique in recommendation systems. It can promote items of interest to a target user from a large selection of available items. It is divided into two broad classes: memory-based algorithms and model-based algorithms. The latter requires some time to build a model but recommends online items quickly, while the former is time-consuming but does not require pre-building time. Considering the shortcomings of the two types of algorithms, we propose a novel Community-based User domain Collaborative Recommendation Algorithm (CUCRA). The idea comes from the fact that recommendations are usually made by users with similar preferences. The first step is to build a user-user social network based on users’ preference data. The second step is to find communities with similar user preferences using a community detective algorithm. Finally, items are recommended to users by applying collaborative filtering on communities. Because we recommend items to users in communities instead of to an entire social network, the method has perfect online performance. Applying this method to a collaborative tagging system, experimental results show that the recommendation accuracy of CUCRA is relatively good, and the online time-complexity reduces to O.n/.  相似文献   

3.
The integration of different heterogeneous access networks is one of the remarkable characteristics of the next generation network,in which users with multi-network interface terminals can independently select access network to obtain the most desired service.A kind of unified quantification model of non-monotone quality of service (QoS) and a model of non-cooperative game between users and networks are proposed for heterogeneous network access selection.An optimal network pricing mechanism could be formulated by using a novel strategy which is used in this non-cooperative game model to balance the interests of both the users and the networks.This access network selection mechanism could select the most suitable network for users,and it also could provide the basis when formulating QoS standards in heterogeneous integrated networks.The simulation results show that this network selection decision-making algorithm can meet the users' demand for different levels service in different scenes and it can also avoid network congestion caused by unbalanced load.  相似文献   

4.
The paper analyzes the equity of road resources distribution in urban areas by modeling the competitive relationship among different road users. A logistic model is used to describe the development of different traffic modes in the transportation network. The system is similar to the species competition model, so a two-species model is used to analyze the relationship between users based on the stability of the equilibrium points. The Lotka-Volterra model is then used to describe the multi-species cases with numerical examples, showing that this model can describe the effects of the road space distribution on the competitive user relationships. Policy makers must ensure the equity of road resources distribution so that each urban transportation mode is properly developed for sustainable social development.  相似文献   

5.
With the development of the social media and Internet, discovering latent information from massive information is becoming particularly relevant to improving user experience. Research efforts based on preferences and relationships between users have attracted more and more attention. Predictive problems, such as inferring friend relationship and co-author relationship between users have been explored. However, many such methods are based on analyzing either node features or the network structures separately, few have tried to tackle both of them at the same time. In this paper, in order to discover latent co-interests’ relationship, we not only consider users’ attributes but network information as well. In addition, we propose an Interest-based Factor Graph Model (I-FGM) to incorporate these factors. Experiments on two data sets (bookmarking and music network) demonstrate that this predictive method can achieve better results than the other three methods (ANN, NB, and SVM).  相似文献   

6.
A kind of fault diagnosis system of molten carbonate fuel cell (MCFC) stack is proposed in this paper. It is composed of a fuzzy neural network (FNN) and a fault diagnosis element. FNN is able to deal with the information of the expert knowledge and the experiment data efficiently. It also has the ability to approximate any smooth system. FNN is used to identify the fault diagnosis model of MCFC stack. The fuzzy fault decision element can diagnose the state of the MCFC generating system, normal or fault, and can decide the type of the fault based on the outputs of FNN model and the MCFC system. Some simulation experiment results are demonstrated in this paper.  相似文献   

7.
Increasing time-spent online has amplified users' exposure to tile tilreat oI miormanon leakage. Although existing security systems (such as firewalls and intrusion detection systems) can satisfy most of the security requirements of network administrators, they are not suitable for detecting the activities of applying the HTTP-tunnel technique to steal users' private information. This paper focuses on a network behavior-based method to address the limitations of the existing protection systems. At first, it analyzes the normal network behavior pattern over HTI'P traffic and select four features. Then, it pres- ents an anomaly-based detection model that applies a hierarchical clustering technique and a scoring mechanism. It also uses real-world data to validate that the selected features are useful. The experiments have demonstrated that the model could achieve over 93% hit-rate with only about 3% false- positive rate. It is regarded confidently that the approach is a complementary technique to the existing security systems.  相似文献   

8.
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.  相似文献   

9.
Intrusion detection system can make effective alarm for illegality of network users, which is absolutely necessarily and important to build security environment of communication base service. According to the principle that the number of network traffic can affect the degree of self-similar traffic, the paper investigates the variety of self-similarity resulted from unconventional network traffic. A network traffic model based on normal behaviors of user is proposed and the Hurst parameter of this model can be calculated. By comparing the Hurst parameter of normal traffic and the self-similar parameter, we can judge whether the network is normal or not and alarm in time.  相似文献   

10.
The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.  相似文献   

11.
Time series prediction has been successfully used in several application areas, such as meteoro-logical forecasting, market prediction, network traffic forecasting, etc. , and a number of techniques have been developed for modeling and predicting time series. In the traditional exponential smoothing method, a fixed weight is assigned to data history, and the trend changes of time series are ignored. In this paper, an uncertainty reasoning method, based on cloud model, is employed in time series prediction, which uses cloud logic controller to adjust the smoothing coefficient of the simple exponential smoothing method dynamically to fit the current trend of the time series. The validity of this solution was proved by experiments on various data sets.  相似文献   

12.
In this work, Kendall correlation based collaborative filtering algorithms for the recommender systems are proposed. The Kendall correlation method is used to measure the correlation amongst users by means of considering the relative order of the users' ratings. Kendall based algorithm is based upon a more general model and thus could be more widely applied in e-commerce. Another discovery of this work is that the consideration of only positive correlated neighbors in prediction, in both Pearson and Kendall algorithms, achieves higher accuracy than the consideration of all neighbors, with only a small loss of coverage.  相似文献   

13.
IP billing is not only a basic functionality to operate IP sen'ices, but also it is fundamental to offer customers with a stable and QoS-enabled network environment. As IP-based network has been widely agreed to be the core network of NGN, and existing IP billing system is too simple to fulfill the emerging requirements, the next generation IP billing has become an interesting topic in recent years. Policy-based management brings flexibility and scalability to systems by describing management logic and functions through policies, and thus reduces the complexity of the management of large-scale systems. Working on existing efforts, this paper proposed an improved IETF policy framework based upon which a policy-based billing management architecture for the next generation IP-based network was presented. Then a prototype with some basic functionalities was developed. The results of the experiment validated the expected improvements specified in this paper.  相似文献   

14.
A hybrid model of a subminiature helicopter in horizontal turn is presented. This model is based on a mechanism model and its compensated neural network (NN). First, the nonlinear dynamics of a sub-miniature helicopter is established. Through the linearization of the nonlinear dynamics on a trim point, the linear time-invariant mechanism model in horizontal turn is obtained. Then a diagonal recursive neural network is used to compensate the model error between the mechanism model and the nonlinear model, thus the hybrid model of a subminiature helicopter in horizontal turn is achieved. Simulation results show that the hybrid model has higher accuracy than the mechanism model and the obtained compensated-NN has good generalization capability.  相似文献   

15.
A new intelligent control scheme for hot strip coiling temperature is presented. In this scheme, the prediction model of finishing temperature and the presetting model of main cooling zone are establish based on BP neural network, the feed-forward open-loop control model of main cooling zone is constructed based on T-S fuzzy neural network, a new improved structure of T-S fuzzy neural network is developed, and the feedback close-loop control model of precision cooling zone is obtained based on fuzzy control. The effectiveness of the proposed scheme has been demonstrated by computer simulation with a satisfactory result.  相似文献   

16.
A current trend for online social networks is to turn mobile.Mobile social networks directly reflect our real social life,and therefore are an important source to analyze and understand the underlying dynamics of human behaviors (activities).In this paper,we study the problem of activity prediction in mobile social networks.We present a series of observations in two real mobile social networks and then propose a method,ACTPred,based on a dynamic factor-graph model for modeling and predicting users' activities.An approximate algorithm based on mean fields is presented to efficiently learn the proposed method.We deploy a real system to collect users' mobility behaviors and validate the proposed method on two collected mobile datasets.Experimental results show that the proposed ACTPred model can achieve better performance than baseline methods.  相似文献   

17.
Web multimedia information retrieval using improved Bayesian algorithm   总被引:2,自引:0,他引:2  
The main thrust of this paper is application of a novel data mining approach on the log of user‘ s feedback to improve web multimedia information retrieval performance. A user space model was constructed based on data mining, and then integrated into the original information space model to improve the accuracy of the new information space model. It can remove clutter and irrelevant text information and help to eliminate mismatch between the page author‘ s expression and the user‘ s understanding and expectation. User spacemodel was also utilized to discover the relationship between high-level and low-level features for assigning weight. The authors proposed improved Bayesian algorithm for data mining. Experiment proved that the au-thors‘ proposed algorithm was efficient.  相似文献   

18.
Based on the characteristics of nonlinearity, multi-case, and multi-disturbance, it is difficult to establish an accurate parameter model on the hydraulic turbine system which is limited by the degree of fitting between parametric model and actual model, and the design of control algorithm has a certain degree of limitation. Aiming at the modeling and control problems of hydraulic turbine system, this paper proposes hydraulic turbine system identification and predictive control based on genetic algorithm-simulate anneal and back propagation neural network (GASA–BPNN), and the output value predicted by GASA–BPNN model is fed back to the nonlinear optimizer to output the control quantity. The results show that the output speed of the traditional control system increases greatly and the speed of regulation is slow, while the speed of GASA–BPNN predictive control system increases little and the regulation speed is obviously faster than that of the traditional control system. Compared with the output response of the traditional control of the hydraulic turbine governing system, the neural network predictive controller used in this paper has better effect and stronger robustness, solves the problem of poor generalization ability and identification accuracy of the turbine system under variable conditions, and achieves better control effect.  相似文献   

19.
Electronic components' reliability has become the key of the complex system mission execution. Analog circuit is an important part of electronic components. Its fault diagnosis is far more challenging than that of digital circuit. Simulations and applications have shown that the methods based on BP neural network are effective in analog circuit fault diagnosis. Aiming at the tolerance of analog circuit,a combinatorial optimization diagnosis scheme was proposed with back propagation( BP) neural network( BPNN).The main contributions of this scheme included two parts:( 1) the random tolerance samples were added into the nominal training samples to establish new training samples,which were used to train the BP neural network based diagnosis model;( 2) the initial weights of the BP neural network were optimized by genetic algorithm( GA) to avoid local minima,and the BP neural network was tuned with Levenberg-Marquardt algorithm( LMA) in the local solution space to look for the optimum solution or approximate optimal solutions. The experimental results show preliminarily that the scheme substantially improves the whole learning process approximation and generalization ability,and effectively promotes analog circuit fault diagnosis performance based on BPNN.  相似文献   

20.
One of the most important kinds of queries in Spatial Network Databases (SNDB) to support location-based services (LBS) is the shortest path query. Given an object in a network, e.g. a location of a car on a road network, and a set of objects of interests, e.g. hotels, gas station, and car, the shortest path query returns the shortest path from the query object to interested objects. The studies of shortest path query have two kinds of ways, online processing and preprocessing. The studies of preprocessing suppose that the interest objects are static. This paper proposes a shortest path algorithm with a set of index structures to support the situation of moving objects. This algorithm can transform a dynamic problem to a static problem. In this paper we focus on road networks. However, our algorithms do not use any domain specific information, and therefore can be applied to any network, This algorithm's complexity is O(klog2i), and traditional Diikstra's comolexitv is O((i + k)^2).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号