The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With no limit on time and location [1], the number of users attracted by massive open online course (MOOC) has increased rapidly, and many platforms have been built to provide a variety of courses. All of these trigger an explosive growth in data volume. As we known, people have met big data in many areas and proposed many techniques and methods to deal with them. However, people still have no sense...
In this paper, we propose a interactive constrained independent topic analysis in text mining. Independent Topic Analysis (ITA) is a method for extracting the independent topics from the document data by using the independent component analysis. In the independent topic analysis, it is possible to extract the most independent topics between each topic. By extracting the independent topic, it is easy...
We introduce a novel dynamic model for discrete time-series data, in which the temporal sampling may be nonuniform. The model is specified by constructing a hierarchy of Poisson factor analysis blocks, one for the transitions between latent states and the other for the emissions between latent states and observations. Latent variables are binary and linked to Poisson factor analysis via Bernoulli-Poisson...
Link prediction in complex network often focuses on the single network in many fields and develops a lot of methods. However, the relationship between two dependent networks with specific global structure has hardly caught attention, but only the local topology analysis. In this paper, we aim to infer the correlation of two high dimensional dependent networks based on the similar nodes' attributes...
SQL injection is the most common web application vulnerability. The vulnerability can be generated unintentionally by software developer during the development phase. To ensure that all secure coding practices are adopted to prevent the vulnerability. The framework of SQL injection prevention using compiler platform and machine learning is proposed. The machine learning part will be described primarily...
The correlation of interference has been well quantified in Poisson networks where the interferers are independent of each other. However, there exists dependence among the base stations (BSs) in wireless networks. In view of this, we study the interference correlation in non-Poisson networks where the interferers are distributed as a Matern cluster process (MCP) and a second-order cluster process...
Computationally expensive problems pose a serious challenge to the successful application of evolutionary algorithms to complex engineering optimization. To address this challenge, surrogate models, also known as metamodels, are commonly used in lieu of the expensive fitness function for the computational cost of optimization. However, it is nontrivial to choose an appropriate metamodel for properly...
Measures of complex network analysis, such as vertex centrality, have the potential to unveil existing network patterns and behaviors. They contribute to the understanding of networks and their components by analyzing their structural properties, which makes them useful in several computer science domains and applications. Unfortunately, there is a large number of distinct centrality measures and...
Content Delivery Networks (CDN) and their globally dispersed caches host a myriad of User Generated Videos (UGV) to meet end-user requests with quality of service. To efficiently utilize the limited storage of the caches, it is imperative to improve the hit ratio of UGVs. In contrast to the traditional static content, UGV popularity is highly dynamic and dependent on end-user behavior. Therefore,...
In this study, we focus on extraction of latent topic transition from POS data. POS analysis is conducted to obtain the frequent pattern of customer's behavior. The fundamental method for POS analysis is to conduct market basket analysis. By doing Market basket analysis, the sets of products that are often bought at the same time can be extracted. In market basket analysis, however, the effect of...
Every year football clubs trade players in order to build competitive rosters able to compete for success, increase the number of their supporters and amplify sponsors and media attention. In the complex system described by the football transfer market can we identify the strategies pursued by successful teams? Where do they search for new talents? Does it pay to constantly change the club roster?...
In the original algorithm for grey correlation analysis, the detected edge is comparatively rough and the thresholds need determining in advance. Thus, an adaptive edge detection method based on grey correlation analysis is proposed, in which the basic principle of the original algorithm for grey correlation analysis is used to get adaptively automatic threshold according to the mean value of the...
Given data in a matrix X in which rows represent vectors and columns comprise a mix of discrete and continuous variables, the method presented in this paper can be used to generate random vectors whose elements display the same marginal distributions and correlations as the variables in X. The data is represented as a bipartite graph consisting of object nodes (representing vectors) and attribute...
We examine the use of the Fourier transform to discriminate dynamic behavior differences between congested and uncongested systems. Simulation continuous time statistic ‘trajectories’ are converted to time series for Fourier analysis. The pattern of Fourier component magnitudes across frequencies differs for congested versus uncongested systems. We use this knowledge to explore statistical process...
The tutorial will be used to introduce some basic techniques for analysing the output of stochastic simulation models. Using examples, we will describe methods for determining the optimal warm-up length and number of replications as well as introducing ways of using simulation to compare different systems.
The division of a micro-video course content is needed in order to think about decomposition and correlation design of the course content. This paper analyses the principle of dividing a micro-video course content, and defines the connotation and classification of knowledge points in a micro-video course. Based on the analysis of instructional objectives, the decomposition of a micro-video course...
We study the modeling of Lagrangian systems with multiple degrees of freedom. Based on system dynamics, canonical parametric models require ad hoc derivations and sometimes simplification for a computable solution; on the other hand, due to the lack of prior knowledge in the system’s structure, modern nonparametric models in machine learning face the curse of dimensionality, especially in learning...
Taking the group of IT R&D personnel as the research subject, we investigated 267 employees through the questionnaire of work-family conflict, work-family promotion, psychological contract and turnover intention. The results showed: 1) Work-family conflict negatively affects psychological contract, and positively affects turnover intention; 2) Work-family promotion positively affects psychological...
The increasing importance of services in high-wage countries calls for a detailed examination of service productivity and complexity in current research projects. This paper describes the development of a measurement model with regard to service productivity and complexity of emergency medical services. While the measurement model of service productivity is partly literature-based, a novel construct...
Despite the great development in modeling the I-V characteristics of the PV module, the outdoor conditions variations still the main difficulty to predict its performances. In this work, anew approach proposed to reconstruct the I-V characteristic of a PV module under variousreal conditions of irradiance and temperature. Based on the characterization tests data, carried out on four different PV modules...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.