The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, we derive the Bayesian estimators of polytomous item response theory (IRT) models with an approximated conditional likelihood function and consider their mathematical optimalities. First, we derive Bayesian estimators of the rating scale model (RSM) and related IRT models with a conditional type approximated likelihood function proposed by [10]. Then, we evaluate the admissibility and...
Matrix completion is the task of recovering a data matrix from a sample of entries, and has received significant attention in theory and practice. Normally, matrix completion considers a single matrix, which can be a noisy image or a rating matrix in recommendation. In practice however, data is often obtained from multiple domains rather than a single domain. For example, in recommendation, multiple...
How do the k-core structures of real-world graphs look like? What are the common patterns and the anomalies? How can we use them for algorithm design and applications? A k-core is the maximal subgraph where all vertices have degree at least k. This concept has been applied to such diverse areas as hierarchical structure analysis, graph visualization, and graph clustering. Here, we explore pervasive...
The divergence similarity between two color images is presented based on the Jensen-Shannon divergence to measure the color-distribution similarity. Subjective assessment experiments were developed to obtain mean opinion scores (MOS) of test images. It was found that the divergence similarity and MOS values showed statistically significant correlations.
Acquiring the knowledge about the relationship among friendship network properties and check-in behavior of users (connected in the friendship network) has several benefits such as planning advertising strategies and recommending the friends or places. This paper aims to find the impact of structural patterns hidden in the nodes of a friendship network and external environment changes in the check-in...
Modern data is increasingly complex. High dimensionality, heterogeneity and independent multiple representations are the basic properties of today's data. With increasing sources of data collection, a single object can have multiple representations, which we call views. In this paper we propose a multiview classification technique, which uses fuzzy mapping to obtain maximum similarity between an object...
As the most abundant active transposable elements, Alu elements have 1.1 million copies and occupy 6% of the human genome. Recent evidence indicates that 22 AluY and 6 AluS subfamilies have been the most active Alu elements in recent human history, whose transposition has been implicated in several inherited human diseases and in various forms of cancer by integrating into genes; therefore, understanding...
Skin appearance is almost universally the object of gender-related expectations and stereotypes. This not with standing, remarkably little work has been done on establishing quantitatively whether skin texture can be used for gender discrimination. We present a detailed analysis of the skin texture of 43 subjects based on two complementary imaging modalities afforded by a visible-light dermoscope...
In this paper the application of a new method of features selection was presented. Its effects were compared with several other methods of features selection. The study were performed using a data set containing samples of the sound signal emitted by the arteriovenous fistula. The aim was to create a solution with multiclass classification based on the k-NN classifier family allowing for effective...
Travel surveys provide valuable inputs to a variety of models. While they are well-established, and reliable, they are also associated with large expenses (both in terms of time and actual cost). With the emergence of social media and alternative data sources, researchers and practitioners often wonder if such data sources can supplement (or obviate the need for) conventional data collection efforts...
Recently, privacy protection attracts more and more research efforts especially for social network data. In the literature, most of existing approaches assume that social data are independent to each other which is not the case in the real world applications. In this paper, we are the first attempt to investigate the privacy protection issue when social data are correlated. We model the correlation...
Continuous Integration (CI) is a common practice in agile software development processes. It improves the quality of the developed software and reduces the risk of integration problems. However, the effectiveness of CI depends heavily on the frequency of integration problems. For systematic improvement of the applied agile development process, the effect of large commits on the likelihood of integration...
A sequential test is proposed for detection and isolation of hubs in a correlation graph. Hubs in a correlation graph of a random vector are variables (nodes) that have a strong correlation edge. It is assumed that the random vectors are high-dimensional and are multivariate Gaussian distributed. The test employs a family of novel local and global summary statistics generated from small samples of...
While the data mining in education field gained more and more popularity in recent years, there have many research endeavors to find association rules in students' academic situation. The current methods normally apply traditional association rules mining technique to identify those rules. However, traditional association rules mining technique can not identify difference between different types of...
Two philosophically different approaches to the analysis of signals with imperfect cyclostationarity or polycy-clostationarity of the autocorrelation function due to warping are presented. The first approach consists of directly estimating the time-warping function (or its inverse) in a manner that transforms data having an empirical autocorrelation with irregular cyclicity into data having regular...
In this work we characterize all ambiguities of the convolution on two fixed finite-dimensional complex vector spaces. It will be shown that the convolution ambiguities correspond to factorization ambiguities in the z-domain, which are generated by swapping their zeros. We use this polynomial description to show a deterministic version of a recently introduced masked Fourier phase retrieval design...
In this paper, the authors have proposed a new approach for generating multi-value sequence by utilizing primitive element, trace function, and k-th power residue symbol over odd characteristic field. Let p be an odd prime and Fp be an odd characteristic prime field, m be the degree of the primitive polynomial f(x), and k be a prime factor of p-1. In details, the procedure for generating multi-value...
Legacy work on correcting firewall anomalies operate with the premise of creating totally disjunctive rules. Unfortunately, such solutions are impractical from implementation point of view as they lead to an explosion of the number of firewall rules. In a related previous work, we proposed a new approach for performing assisted corrective actions, which in contrast to the-state-of-the-art family of...
The problem of the centralized caching is studied in a two-layer network. The first layer of the network is constructed by a server and K1 helpers, and the second layer consists of K1 orthogonal sub-networks, each of which contains a helper and K2 users. The pioneer caching design in the two-layer network is to directly apply the Maddah-Ali & Niesen (MAU) centralized caching [1] into individual...
This paper investigates image encryption by using magic squares. We propose a new magic square encryption method to which we refer as Good Lattice Point (GLP) method. Traditional magic square encryption method ([4]) focuses on disordering positions of image pixel points according to magic squares. GLP method works in the same way but gives different encryption periods and better encrypted effect than...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.