METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES
|
|
- Claribel Vivian Davis
- 5 years ago
- Views:
Transcription
1 Assocaton for Informaton Systems AIS Electronc Lbrary (AISeL) PACIS 2016 Proceedngs Pacfc Asa Conference on Informaton Systems (PACIS) Summer METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES Ltng Dng Behang Unversty, Jun Wang Behang Unversty,, We We Behang Unversty, Follow ths and addtonal works at: Recommended Ctaton Dng, Ltng; Wang, Jun; and We, We, "METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES" (2016). PACIS 2016 Proceedngs Ths materal s brought to you by the Pacfc Asa Conference on Informaton Systems (PACIS) at AIS Electronc Lbrary (AISeL). It has been accepted for ncluson n PACIS 2016 Proceedngs by an authorzed admnstrator of AIS Electronc Lbrary (AISeL). For more nformaton, please contact elbrary@asnet.org.
2 METHOD FOR DETECTING KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SOCIAL NETWORK SITES Ltng Dng, Department of Informaton Systems, Behang Unversty, Beng, Chna, Jun Wang, Department of Informaton Systems, Behang Unversty, Beng, Chna, We We, Department of Informaton Systems, Behang Unversty, Beng, Chna, Abstract It s sgnfcantly meanngful for mprovng nformaton transmsson n socal network ste(sns) to detect the most nfluental nodes. The key nodes who occupy structural holes are easer to acqure nformaton benefts and control benefts from ther relatonshp network. Ths study summarzes the exstng structural holes measurng methods based on Burt s structural holes theory, and provdes a new mproved method accordng to the features of SNS, whch consders the degree of nodes and the topologcal structure of ther neghbor nodes. In addton, to evaluate the accuracy of those measurng methods, the susceptble-nfected-recovered(sir) model s used to smulate experment n four real data sets of socal network. The expermental result shows that our method has a better accuracy and applcablty. Ths paper comes up wth a new dea and method for detectng key nodes who occupy structural holes n SNS. Keywords: structural holes, key nodes, socal network, nformaton transmsson.
3 1 INTRODUCTION Wth the development of SNS and vrtual communty, how to detect key nodes attracts a wde spread attenton. Those key nodes play very mportant roles n whether promotng the actveness of socal networks users or nformaton transmsson. The methods of detectng key nodes can be dvded nto 3 knds roughly: system scence analyss method, the nformaton search analyss method and the socal network analyss method (Newman, 2003), of whch the system scence analyss method measures the mportance of nodes through computng the damage degree of network after detectng the nodes; The most representatve nformaton search analyss methods are PageRank (Page, 1999) and HITS (Klenberg, 1999). Besdes, the socal network analyss method s more general and more sutable for the analyss of bg data n complex networks. The term Socal networks was used by the Brtsh anthropology Brown at the earlest (Brown, 1952). And ts vewpont attracted a wde attenton by the academa n 60-70s of 20th century. The socal network analyss methods measure network structure of the ego networks or the whole networks based on node and relatonshp of networks, of whch mportant measurement ndexes nclude degree, densty, centralty, brdge, betweenness and so on (Newman, 2010). The most famous socal network structure theores are weak tes theory (Granovetter, 1973) and structural holes theory (Burt, 1992). The two theores are relevant, but weak tes theory focuses on the strength of the relatonshp. The occupants of structural holes n the socal networks can get more opportuntes, ncludng nformaton benefts and control benefts (Burt, 2005). Detectng key nodes who occupy structural holes has a gudng sgnfcance on enhancng knowledge transmsson of SNS. Recently, structural holes theory has attracted wdely attenton. However, t s usually used to analyze relatonshp structure of enterprse employees and enterprse resources rather than relatonshp networks of SNS. Thus, ths paper summarzes the exstng structural holes measurng methods, and provdes a new mproved method accordng to the features of SNS, and also evaluates measurng method and analyzes the expermental results through the actual socal network data sets. The paper s organzed as follows: the next secton dscusses the research background, Secton 3 presents the mproved method of detectng key nodes who occupy structural holes, and secton 4 descrbes the data sets and the evaluaton methodology. The emprcal analyss and dscusson are examned n Secton 5. Fnally, we present our conclusons n Secton 6. 2 THEORETICAL BACKGROUND 2.1 The structural holes theory The structural holes theory was mentoned by Ronald Burt n hs book-structural Holes: The Socal Structure of Competton (Burt, 1992). Structural hole descrbes the non-repettve relatonshp between two players of networks. Burt thnks t lke a buffer, an nsulator n an electrc crcut (Burt, Klduff & Tassell, 2013). The strong tes of socal networks mean the lack of structural holes. Burt consders socal network s a knd of socal captal. The players who access to structural holes possess more opportuntes and valuable nformaton, and thus gan compettve advantages (Burt, 2015). Wth the development of the theory, some measurement ndexes of structural holes are mentoned by Burt, whch nclude Constrant (CS), Herarchy (HA), Effectve Sze(ES) and Effcent (EC) (Burt, 2004). In addton, betweenness centralty (BC) mentoned by Freeman (Freeman, 1977) and PageRank are also used to research the nfluence of nodes n socal networks (Brn & Page, 1998). Su and Song (2015) also came up wth a method based on the local centrcty of the neghbourhood. Lou and Tang (2013) dscovered two algorthms to detect the structural holes n the large-scale socal networks based on the nformaton flow theory and mnmal cut theory. As we can see, the measurement ndexes of structural holes have been wdely dscussed recently. However, n the related research, enterprse employees were usually regarded as the research obects, Burt also encouraged the rch network data n vrtual worlds to be used for better understandng networks n the real world (Burt, 2014). Fndng the key nodes based on
4 structural holes theory n SNS s a new research dea. But the relatonshp among the dfferent measurng methods and ther applcaton stll need further research. 2.2 The exstng measurng methods of key nodes who occupy structural holes We summarze 7 exstng measurng methods n table 1. Table 1. The exstng measurng methods of key nodes who occupy structural holes Proposers Name Computng methods Bref ntroducton It expresses the rato of nonredundant relaton of the player s networks. Effectve and are the neghbour Sze ES (1 Pqm q ), q, nodes of. q (ES) s the redundancy Burt Freeman Page Su & Song Effcency (EC) Constrant (CS) Herarchy (HA) Betweenness Centralty (BC) PageRank (PR) N-Burt (NB) HI ES EC n P Z Z q q C ( P P P ) q q q 2 q Pm q q q of node and. It reflects the rato of effectve sze to actual sze. It shows the extent to whch a player s network tme and energy are concentrated n others. s the constrant of to C. Z s the relatonshp C C, strength between and. s the rado of the nvestment of to to ts total network nvestment. C C C ln C The Coleman-Thel nequalty ndex s used to N N Nln N descrbe the herarchy. BC PR P d Q P 1 n It reflects the control degree to network resources of node (Freeman, 1979). st 2 n n 1 st gst P PR P v L P k w v 1 d N Qv Q P The core part of the search rankng technology of Google. Q( ) s the sum of degree neghbor nodes of. kw ( ) s the degree of node w. And s the set of neghbour nodes of. The C s the same as Burt s Constrant.
5 3 THE IMPROVED MEASURING METHOD OF KEY NODES WHO OCCUPY STRUCTURAL HOLES IN SNS The above measurng methods all have some applcablty. But the measurement ndexes of structural holes mentoned by Burt only consder the approxmal nodes, and betweenness centralty would be computed for the mmedate network around a person, whch maybe not be accurate n the large-scale SNS. Combng wth the features of relatonshp networks n SNS, we come up wth a new method to detect the key nodes who occupy structural holes, whch s descrbed as follow n detal. 3.1 V-Constrant (VC) The most mportant ndex n the measurement ndexes of structural holes mentoned by Burt s Constrant. However, Burt usually detects structural holes of the relatonshp networks n enterprses, and assumes one player spends hmself/herself tme and energy on the players who have a drect connecton wth hs/her. Nevertheless, n the SNS, the frendshp means a strong te between two nodes. Thanks to the prevalence of Internet and socal software, t s easy for a user to come nto contact wth other user nodes takng advantage of hs/her frends, and then spend hs/her tme and energy on those user nodes. Take Facebook or Twtter as an example, there are two users who are not frends or don t follow each other n a SNS. But a user can browse to the other user's nformaton easly through hs/her frends shared or forwarded nformaton. Those nvestments of tme and energy should also belong to the nvestment of users spend on ther socal networks. G A B H L F E D C The fgure Burt used to descrbe how to calculate Constrant M Fgure 1. Computng the constrant As we can see from fgure 1, the dashed area s the fgure Burt used to descrbe how to calculate Constrant. Because node E and F have the same neghbour node A wth the purple node. Accordng 2 to the formula of Constrant, CE CF (1/ 6 (1/ 6) (1/ 4)) That s to say, node spends the same tme and energy on node E and F. If node E and F connect to a dfferent number of nodes, t s convenent for node to access the adacent node (G, H, L, M ) of node E and F. Specfcally, when F has more adacent nodes than E, and those adacent nodes don t have relaton wth node and node F are more lkely to share new thngs and nformaton to node so that more tme and energy mantanng relatonshp wth node F. It s a pty that those stuatons cannot be showed n Burt s Constrant. wll spend Therefore, 1, 2 are used to reflect the proporton of users nvestment on ther drect relatons and ndrect relatons s s used to descrbe the nvestment proporton of to hs/her total nvestment n the socal networks for mantanng the relatonshp wth, whch s defned as follow: s p p R (1) 1 2
6 R reflects the rato of the numbers of frends of to the all numbers of frends of adacent nodes of. Those numbers of frends are exclusve of and the common adacent nodes of and F, whch s computed through the ndrect nvestment proporton Here k( ) s the degree of node, and n s the set of neghbour nodes of node. Then, Where q s the common adacent nodes of and. We can survey the users of SNS to get the value of s s q q q,. That s: L k n (2) means the number of common adacent nodes of R L L v and (3) v 2 C s sqsq, q (4) q 1 and typcal users are nvestgated to calculate the average value of 4 SIMULATION AND EXPERIMENT 4.1 Data sets 2. Samplng survey s used. A part of the 1 and 2. To evaluate those several measurng methods, we chose 4 real socal networks to do smulaton experment. The 4 data sets are Zachary's karate club (Zachary, 1977), Dolphn socal networks (Lusseau et al, 2003), coauthorshps n network scence (Of whch the bggest connected subset, called Netscence ) (Newman, 2006) and a connected subset of Twtter user relatonshp networks (Hopcroft, Lou & Tang, 2011). We collected the frst three data sets from the webste: and the last one s from The basc statstcal characterstcs of networks are shown n table 2. Table 2. The basc statstcal characterstcs of networks Name Nodes Edges Average degree Average path length Karate Dolphns Netscence Twtter The evaluaton methodology We use pearson s correlaton coeffcent to analyze the correlaton of the results of those dfferent measurng methods. Besdes, SIR model s usually used to research the nformaton transmsson. Accordng to Burt s structural holes theory, the nodes occupy structural holes are those nodes who can nfluence the.
7 nformaton transmsson of socal networks. Thus, we choose SIR model to smulate the process of nformaton transmsson (Anderson & Mary, 1992; Dekmann & Heesterbeek, 2000; Pastor-Satorrasr, 2001). There are 3 states of SIR model: the state of S (susceptble), I(nfected) and R(recovered). We set one node as the ntal nfected node, ts neghbour nodes can be nfected n a probablty of, and the nfected nodes can be changed to the state of recovered n a probablty of. After a certan tme t, the total number of nodes n state I and R s used to descrbe the actual transmsson capacty of the node. We also sort the actual transmsson capacty of nodes, and have a comparson wth the orderng results of methods of measurng methods of key nodes who occupy structural holes. Kendall tau rank correlaton coeffcent s used to evaluate the valdty of the orderng results (Knght, 1966). 5 THE EXPERIMENTAL RESULTS AND ANALYSIS 5.1 The correlaton analyss of the dfferent measurng methods We evaluate the correlaton of measurng methods based on pearson s correlaton coeffcent as we mentoned n secton 4.2. Take the data set of Twtter as an example, the results of correlaton of measurng methods are shown n table 3. The smlar results are obtaned from the rest 3 data sets. In the method of VC, we set ω 1 = 0.9, and ω 2 = 0.1. Table 3. The results of correlaton of measurng methods of key nodes who occupy structural holes ES EC CS HA BC NB VC PR ES ** ** ** ** **.985 ** EC *.451 ** * * CS * **.926 **.994 ** ** HA * BC ** **.924 ** NB ** ** VC ** PR The smulaton experment analyss of SIR model 2 We set the transmsson tme t 10, the threshold value of nfecton rate ~ k / k. The actual nfecton rate should slghtly bgger than the threshold value so that the nformaton can transmt normally. The recovery rate =0.01. We repeat the experment 100 tmes n term of each node, after that we get the average value of the number of nodes n state I and R, whch s recorded as AT. Then Kendall tau rank correlaton coeffcent s used to calculate the correlaton of orderng results. Fgure 3 shows the results of pearson s correlaton coeffcent of measurng methods and AT (Due to lmted space, only the tow results of Netscence networks are shown here). We only analyze the Constrant, the most representatve measurement ndex of Burt s structural holes theory, and the rest measurng methods. We can see from the results that the actual transmsson capacty has a negatve correlaton wth Constrant, N-Burt and V-Constrant, postve correlaton wth Betweenness Centralty and PageRank. It shows that the several measurng methods can also detect the structural holes nodes whch can mprove the nformaton transmsson. Partcularly, the V-Constrant we came up n ths paper has a more deal result, whch consders the topologcal structure of neghbour nodes, so that can better adapt to the stuaton of Internet and SNS.
8 Fgure 3. The results of pearson s correlaton coeffcent of measurng methods and AT We also compare the experment results of smulaton experment n term of dfferent measurng methods. Due to the lmted space, we only show two of the result fgures n fgure 4. The coordnate of color stands for the actual transmsson capacty of node. It can be seen that the smaller the results of V- Constrant or N-Burt and the bgger the results of PageRank, the AT bgger. Fgure 4. The experment results of smulaton experment n term of dfferent measurng methods Table 4. The results of Kendall tau rank correlaton coeffcent of measurng methods and AT Name (CS, AT) (BC, AT) (NB, AT) (VC, AT) (PR, AT) Karate Dolphns Netscence Twtter Table 4 shows the results of Kendall tau rank correlaton coeffcent. The second column s the nfecton rate we set for the networks. The bgger the absolute value of results of Kendall tau rank correlaton coeffcent s, the rankng results of measurng methods and the actual transmsson ablty are closer. Table 4 reflects that N-Burt and V-Constrant have the good accuracy of orderng results.
9 What s more, to llustrate the real value of several measurng methods, we statstcs the top-5 key nodes occupy structural holes n Netscence data sets n term of N-Burt and V-Constrant, whch have a better performance n the above analyss. As we can see n the table 5, the frst column s the names of authors, column 2 and 3 s the rankng and the last column s the poston Summary of authors. Name Table 5. The top-5 key nodes occupy structural holes n Netscence data sets Rankng NB VC Ttle M. E. J. Newman 1 1 Dstngushed Professor(Unversty of Mchgan) A.-L. Barabás 2 2 Hawoong Jeong 3 3 Romualdo Pastor-Satorras Dstngushed Professor (Northeastern Unversty) Drector(Center for Complex Network Research, Northeastern Unversty) Professor(Korea Advanced Insttute of Scence and Technology) 5 4 Assocate Professor(Unverstat Poltècnca de Catalunya) Stefano Boccalett 4 5 Professor(Unversdad de Navarra) Through the two measurng methods, we fnd several promnent scholars n the felds of complex networks, systems engneerng and physcs. Several emprcal studes also have demonstrated structural holes s postvely relate to a seres of ndcators of socal success (Burt, 2004; Podolny & Baron, 1996). It s vsble that N-Burt and V-Constrant have wonderful practcal value, whch can be used to detect key nodes who occupy structural holes advantages n the socal networks. 6 CONCLUSION AND LIMITATION It s of mportant sgnfcance to detect key nodes n the socal networks for mprovng the effcency of nformaton transmsson. Detectng the key nodes and the sequencng problem of key nodes have been the research hotspot n recent years. In our study, we analyze the Burt s structural holes measurement ndexes, summarze the exstng measurng methods, and come up wth a new measurng method that combnes wth the characterstcs of SNS. Through the smulaton experment wth SIR model, we can prove that our measurng method have a better performance and applcablty than others. Compared wth prevous measurng methods, V-Constrant takes the topologcal structure of neghbour nodes nto account. It can gve a gudance for detectng key nodes n SNS and mprovng the users actveness and nformaton transmsson n SNS. For SNS managers, focusng on key users of the webstes can contrbute to knowledge sharng, controllng rumours and so on. Key users who occupy structural holes wll also be pad attenton by advertsng agences to mprove the effect of advertsement. As for what the user characterstcs of those key nodes who occupy structural holes are, and how to mprove nformaton transmsson, s our future research drectons. Besdes, V-Constrant stll need to mprove to deal wth more complex topologcal structure of nodes. Acknowledgement The work descrbed n ths paper was supported by the Natonal Natural Scence Foundaton of Chna under Grant No and No
10 References Anderson, R. M., & May, R. M. (1992). Infectous dseases of humans: dynamcs and control. Infectous Dseases of Humans Dynamcs & Control, 108(2), Brn, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engne. Computer Networks & Isdn Systems, 30(98), Borgatt, S. P., & Everett, M. G. (1997). Network analyss of 2-mode data. Socal Networks, 19(3), Burt, R. S. (1992). The socal structure of competton. Eds., Networks and Organzatons: Structure, Form, and Acton. Burt, R. S. (2004). Structural holes and good deas1. Amercan ournal of socology, 110(2), Burt, R. S. (2005). Brokerage and closure: An ntroducton to socal captal. Oxford Unversty Press. Burt, R. S. (2014). Structural Holes n Vrtual Worlds. Workng paper. Oxford Unversty Press. Burt, R. S. (2015). Renforced structural holes. Socal Networks, 43, Burt, R. S, Klduff, M. & Tassell, S. (2013). Socal Network Analyss: Foundatons and Fronters on Advantage. Dekmann, O., & Heesterbeek, J. A. P. (2000). Mathematcal epdemology of nfectous dseases: model buldng, analyss and nterpretaton. Chchester: John Wley & Sons,303 (1), 186. Freeman, L. C. (1977). A set of measures of centralty based on betweenness. 40(1), Freeman, L. C. (1979). Centralty n socal networks:. conceptual clarfcaton. Socal Networks, 1(3), Granovetter, M. S. (1973). The strength of weak tes. Socal Scence Electronc Publshng, 13(2), Hopcroft, J., Lou, T., & Tang, J. (2011). Who wll follow you back? recprocal relatonshp predcton. In Proceedngs of the 20th ACM nternatonal conference on Informaton and knowledge management, Klenberg, J. M. (1999). Authortatve sources n a hyperlnked envronment. Journal of the Acm, 46(5), Knght, W. R. (1966). A computer method for calculatng kendall's tau wth ungrouped data. Journal of the Amercan Statstcal Assocaton, 61(314), Lou, T., & Tang, J. (2013, May). Mnng structural hole spanners through nformaton dffuson n socal networks. In Proceedngs of the 22nd nternatonal conference on World Wde Web, Lusseau, D., Schneder, K., Bosseau, O. J., Haase, P., Slooten, E., & Dawson, S. M. (2003). The bottlenose dolphn communty of doubtful sound features a large proporton of long-lastng assocatons: can geographc solaton explan ths unque trat?, Behavoral Ecology & Socobology, 54(4), Newman, M. E. J. (2006). Fndng communty structure n networks usng the egenvectors of matrces. Physcal revew E, 74(3), Newman, M. E. J. (2003). The Structure and Functon of Complex Networks. Sam Revew, 45(2), Newman, M. E. J. (2010). Networks: An Introducton. Oxford Unversty Press, Inc. Page, L. (1999). The PageRank Ctaton Rankng: Brngng Order to the Web. Stanford InfoLab,9, Pastorsatorras, R. & Vespgnan, A. (2001). Epdemc spreadng n scale-free networks. Physcal Revew Letters, 86(14) Podolny, J. & Baron, J. (1996). Resources and Relatonshps: Socal Networks and Moblty n the Workplace. Amercan Socologcal Revew, 62(5), Radclffe-Brown A R. (1952). Structure and functon n prmtve socety. Amercan Anthropologst, 56(1), Su, X. P., & Song, Y. R. (2015). Leveragng neghborhood "structural holes" to dentfyng key spreaders n socal networks. Acta Physca Snca -Chnese Edton-, 64(2), Zachary, W. W. (1977). An nformaton flow model for conflct and fsson n small groups1. J.anthropolog.res, 33(4), 473.
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationFinite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c
Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor
More informationStructure Formation of Social Network
Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationIdentifying Top-k Most Influential Nodes by using the Topological Diffusion Models in the Complex Networks
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Vol. 8, No., 07 Identfyng Top-k Most Influental Nodes by usng the Topologcal Dffuson Models n the Complex Networks Maryam Padar,
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationStudy on Properties of Traffic Flow on Bus Transport Networks
Study on Propertes of Traffc Flow on Bus Transport Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN, AND YOU-YU DONG College of Computer Scence and Technology Zhejang Unversty of Technology Hangzhou, 310023,
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationA Simulation Study for Emergency/Disaster Management by Applying Complex Networks Theory
A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationAn Algorithm for Weighted Positive Influence Dominating Set Based on Learning Automata
4 th Internatonal Conference on Knowledge-Based Engneerng and Innovaton (KBEI-2017) Dec. 22 th, 2017 (Iran Unversty of Scence and Technology) Tehran, Iran An Algorthm for Weghted Postve Influence Domnatng
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationA Growing Network Model with High Hub Connectivity and Tunable Clustering Coefficient
Manuscrpt receved Aug. 23, 2007; revsed ov. 29, 2007 A Growng etwork Model wth Hgh Hub Connectvty and Tunable Clusterng Coeffcent YIHJIA TSAI, PIG-A HSIAO Department of Computer Scence and Informaton Engneerng
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationSignificance of Eigenvector Centrality for Routing in a Delay Tolerant Network
Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network
More informationCOMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES. University, Beijing , China
COMPARISON OF TWO MODELS FOR HUMAN EVACUATING SIMULATION IN LARGE BUILDING SPACES Bn Zhao 1, 2, He Xao 1, Yue Wang 1, Yuebao Wang 1 1 Department of Buldng Scence and Technology, Tsnghua Unversty, Bejng
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationEffectiveness of Information Retraction
Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationA New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1
A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationFEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur
FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationA Deflected Grid-based Algorithm for Clustering Analysis
A Deflected Grd-based Algorthm for Clusterng Analyss NANCY P. LIN, CHUNG-I CHANG, HAO-EN CHUEH, HUNG-JEN CHEN, WEI-HUA HAO Department of Computer Scence and Informaton Engneerng Tamkang Unversty 5 Yng-chuan
More informationRESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION
RESEARCH ON EQUIVALNCE OF SPATIAL RELATIONS IN AUTOMATIC PROGRESSIVE CARTOGRAPHIC GENERALIZATION Guo Qngsheng Du Xaochu Wuhan Unversty Wuhan Unversty ABSTRCT: In automatc cartographc generalzaton, the
More informationRanking Techniques for Cluster Based Search Results in a Textual Knowledge-base
Rankng Technques for Cluster Based Search Results n a Textual Knowledge-base Shefal Sharma Fetch Technologes, Inc 841 Apollo St, El Segundo, CA 90254 +1 (310) 414-9849 ssharma@fetch.com Sofus A. Macskassy
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationLocating Software Faults Based on Control Flow and Data Dependence
JOURNAL OF COMPUTERS, VOL. 9, NO. 12, DECEMBER 2014 2797 Locatng Software Faults Based on Control Flow and Data Dependence Chenghu Hu Lab of Intellgent Computng and Software Engneerng Zhejang Sc-Tech Unversty
More informationEvaluation of the application of BIM technology based on PCA - Q Clustering Algorithm and Choquet Integral
IETI Transactons on Busness and Management Scences, 2016, Volume 1, Issue 1, 47-55. http://www.et.net/tc An Internatonal Open Access Journal Evaluaton of the applcaton of BIM technology based on PCA -
More informationANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE
ANALYSIS OF THE COMPLEX MATERIAL FLOW NETWORKS IN TYPICAL STEEL ENTERPRISE 1 YEQING ZHAO, 2 GUIHONG BI 1 School of Computer and Informaton Engneerng, Anyang Normal Unversty, Anyang 455002, Henan, Chna
More informationQuerying by sketch geographical databases. Yu Han 1, a *
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationEdge Detection in Noisy Images Using the Support Vector Machines
Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationApplication of Clustering Algorithm in Big Data Sample Set Optimization
Applcaton of Clusterng Algorthm n Bg Data Sample Set Optmzaton Yutang Lu 1, Qn Zhang 2 1 Department of Basc Subjects, Henan Insttute of Technology, Xnxang 453002, Chna 2 School of Mathematcs and Informaton
More informationStudy on base-core Mode Coupling Networks
Study on base-core Mode Couplng Networks XU-HUA YANG, JIU-QIANG ZHAO, GUANG CHEN College of Computer Scence and Technology Zheang Unversty of Technology Hangzhou, 30023, Chna P.R.Chna xhyang@zut.edu.cn
More informationA Method of Query Expansion Based on Event Ontology
A Method of Query Expanson Based on Event Ontology Zhaoman Zhong, Cunhua L, Yan Guan, Zongtan Lu A Method of Query Expanson Based on Event Ontology 1 Zhaoman Zhong, 1 Cunhua L, 1 Yan Guan, 2 Zongtan Lu,
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationThe Effect of Similarity Measures on The Quality of Query Clusters
The effect of smlarty measures on the qualty of query clusters. Fu. L., Goh, D.H., Foo, S., & Na, J.C. (2004). Journal of Informaton Scence, 30(5) 396-407 The Effect of Smlarty Measures on The Qualty of
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationHeterogeneity in Vulnerable Hosts Slows Down Worm Propagation
Heterogenety n Vulnerable Hosts Slows Down Worm Propagaton Zesheng Chen and Chao Chen Department of Engneerng Indana Unversty - Purdue Unversty Fort Wayne, Indana 4685 Emal: {zchen, chen}@engr.pfw.edu
More informationGrowth model for complex networks with hierarchical and modular structures
Growth model for complex networks wth herarchcal and modular structures Q Xuan, Yanjun L,* and Te-Jun Wu Natonal Laboratory of Industral Control Technology, Insttute of Intellgent Systems & Decson Makng,
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationTHE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT
Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationDomain Thesaurus Construction from Wikipedia *
Internatonal Conference on Computer, Networks and Communcaton Engneerng (ICCNCE 2013) Doman Thesaurus Constructon from Wkpeda * WenKe Yn 1, Mng Zhu 2, TanHao Chen 2 1 Department of Electronc Engneerng
More informationEnhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques
Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationA Clustering Algorithm Solution to the Collaborative Filtering
Internatonal Journal of Scence Vol.4 No.8 017 ISSN: 1813-4890 A Clusterng Algorthm Soluton to the Collaboratve Flterng Yongl Yang 1, a, Fe Xue, b, Yongquan Ca 1, c Zhenhu Nng 1, d,* Hafeng Lu 3, e 1 Faculty
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More informationA CO-TRAINING METHOD FOR IDENTIFYING THE SAME PERSON ACROSS SOCIAL NETWORKS
A CO-TRAINING METHOD FOR IDENTIFYING THE SAME PERSON ACROSS SOCIAL NETWORKS Zheng Fang 1,2, Yanan Cao 2, Yanmn Shang 2, Yanbng Lu 2, Janlong Tan 2, L Guo 2 1 School of Cyber Securty, Unversty of Chnese
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationSURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB
SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal
More informationThe impact of network characteristics on the diffusion of innovations. Renana Peres
The mpact of network characterstcs on the dffuson of nnovatons Renana Peres School of Busness Admnstraton Hebrew Unversty of Jerusalem, Jerusalem, Israel 91905 peresren@huj.ac.l August 2013 1 The mpact
More informationEmpirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap
Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationA high precision collaborative vision measurement of gear chamfering profile
Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More information3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method
NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama
More informationData Preprocessing Based on Partially Supervised Learning Na Liu1,2, a, Guanglai Gao1,b, Guiping Liu2,c
6th Internatonal Conference on Informaton Engneerng for Mechancs and Materals (ICIMM 2016) Data Preprocessng Based on Partally Supervsed Learnng Na Lu1,2, a, Guangla Gao1,b, Gupng Lu2,c 1 College of Computer
More information