首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Collaborative tags are playing a more and more important role for the organization of information systems. In this paper, we study a personalized recommendation model making use of the ternary relations among users, objects and tags. We propose a measure of user similarity based on his preference and tagging information. Two kinds of similarities between users are calculated by using a diffusion-based process, which are then integrated for recommendation. We test the proposed method in a standard collaborative filtering framework with three metrics: ranking score, Recall and Precision, and demonstrate that it performs better than the commonly used cosine similarity.  相似文献   

2.
Understanding the complexity of human language requires an appropriate analysis of the statistical distribution of words in texts. We consider the information retrieval problem of detecting and ranking the relevant words of a text by means of statistical information referring to the spatial use of the words. Shannon's entropy of information is used as a tool for automatic keyword extraction. By using The Origin of Species by Charles Darwin as a representative text sample, we show the performance of our detector and compare it with another proposals in the literature. The random shuffled text receives special attention as a tool for calibrating the ranking indices.  相似文献   

3.
面向结构洞的复杂网络关键节点排序   总被引:2,自引:0,他引:2       下载免费PDF全文
韩忠明  吴杨  谭旭升  段大高  杨伟杰 《物理学报》2015,64(5):58902-058902
复杂网络中的结构洞节点对于信息传播具有重要作用, 现有关键节点排序方法多数没有兼顾结构洞节点和其他类型的关键节点进行排序. 本文根据结构洞理论与关键节点排序相关研究选取了网络约束系数、介数中心性、等级度、效率、网络规模、PageRank值以及聚类系数7个度量指标, 将基于ListNet的排序学习方法引入到复杂网络的关键节点排序问题中, 融合7个度量指标, 构建了一个能够综合评价面向结构洞节点的关键节点排序方法. 采用模拟网络和实际复杂网络进行了大量实验, 人工标准试验结果表明本文排序方法能够综合考虑结构洞节点和核心节点, 关键节点排序与人工排序结果具有较高的一致性. SIR传播模型评估实验结果表明由本文选择TOP-K节点发起的传播能够在较短的传播时间内达到最大的传播范围.  相似文献   

4.
《Physica A》2006,361(2):665-676
In this study the derivation of an objective metrics to appreciate the degree of structuring of written and spoken texts is presented. The proposed metrics is based on the scoring of recurrences inside a text by means of the application of recurrence quantification analysis (RQA), a nonlinear technique widely used in other fields of sciences.The adopted approach allowed us to create a ranking of different poems strictly related to their prosodic structure and, more importantly, the possibility to recognize the same structure across different languages, to define a level of structuring typical of spoken texts and identifying the progressive synchronization of a dyadic relation between two speakers in terms of relative complexity of their speeches. These results suggest the possibility of introducing objective measurement methods into humanities studies.  相似文献   

5.
复杂网络中节点重要性排序的研究进展   总被引:13,自引:0,他引:13       下载免费PDF全文
刘建国  任卓明  郭强  汪秉宏 《物理学报》2013,62(17):178901-178901
如何用定量分析的方法识别超大规模网络中哪些节点最重要, 或者评价某个节点相对于其他一个或多个节点的重要程度, 这是复杂网络研究中亟待解决的重要问题之一. 本文分别从网络结构和传播动力学的角度, 对现有的复杂网络中节点重要性排序方法进行了系统的回顾,总结了节点重要性排序方法的最新研究进展, 并对不同的节点重要性排序指标的优缺点以及适用环境进行了分析, 最后指出了这一领域中几个有待解决的问题及可能的发展方向. 关键词: 复杂网络 节点重要性 网络结构 传播动力学  相似文献   

6.
In the last years, two successful approaches have been introduced to tackle the problem of statistical keyword detection in a text without the use of external information: (i) The entropic approach, where Shannon’s entropy of information is used to quantify the information content of the sequence of occurrences of each word in the text; and (ii) The clustering approach, which links the heterogeneity of the spatial distribution of a word in the text (clustering) with its relevance. In this paper, first we present some modifications to both techniques which improve their results. Then, we propose new metrics to evaluate the performance of keyword detectors based specifically on the needs of a typical user, and we employ them to find out which approach performs better. Although both approaches work well in long texts, we obtain in general that measures based on word-clustering perform at least as well as the entropic measure, which needs a convenient partition of the text to be applied, such as chapters of a book. In the latter approach we also show that the partition of the text chosen affects strongly its results. Finally, we focus on short texts, a case of high practical importance, such as short reports, web pages, scientific articles, etc. We show that the performance of word-clustering measures is also good in generic short texts since these measures are able to discriminate better the degree of relevance of low frequency words than the entropic approach.  相似文献   

7.
Identifying influential nodes in complex networks   总被引:4,自引:0,他引:4  
Identifying influential nodes that lead to faster and wider spreading in complex networks is of theoretical and practical significance. The degree centrality method is very simple but of little relevance. Global metrics such as betweenness centrality and closeness centrality can better identify influential nodes, but are incapable to be applied in large-scale networks due to the computational complexity. In order to design an effective ranking method, we proposed a semi-local centrality measure as a tradeoff between the low-relevant degree centrality and other time-consuming measures. We use the Susceptible-Infected-Recovered (SIR) model to evaluate the performance by using the spreading rate and the number of infected nodes. Simulations on four real networks show that our method can well identify influential nodes.  相似文献   

8.
Text can be regarded as a complex system. There are some methods in statistical physics which can be used to study this system. In this work, by means of statistical physics methods, we reveal new universal behaviors of texts associating with the fractality values of words in a text. The fractality measure indicates the importance of words in a text by considering distribution pattern of words throughout the text. We observed a power law relation between fractality of text and vocabulary size for texts and corpora. We also observed this behavior in studying biological data.  相似文献   

9.
We introduce loop ranking, a new ranking measure based on the detection of closed paths, which can be computed in an efficient way. We analyze it with respect to several ranking measures which have been proposed in the past, and are widely used to capture the relative importance of the vertices in complex networks. We argue that loop ranking is a very appropriate measure to quantify the role of both vertices and edges in the network traffic.  相似文献   

10.
In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss, and blackout sizes. The first two are purely topological metrics. The blackout size calculation results from a model of cascading failure in power networks. Testing the response of 40 areas within the Eastern U.S. power grid and a standard IEEE test case to a variety of attack/failure vectors indicates that directed attacks result in larger failures using all three vulnerability measures, but the attack-vectors that appear to cause the most damage depend on the measure chosen. While the topological metrics and the power grid model show some similar trends, the vulnerability metrics for individual simulations show only a mild correlation. We conclude that evaluating vulnerability in power networks using purely topological metrics can be misleading.  相似文献   

11.
The quality factor of a metric, defined by Bel as a measure of its approximation to a solution of Einstein's equations, is tested with several well-known approximate solutions. Whereas for some metrics such as the linearized plane wave solutions the quality factor leads to some intriguing results, for others such as the Newtonian and post-Newtonian approximations for the one and two body systems, and also the linearized perturbations of the Friedmann-Robertson-Walker metrics, it seems to lead to very reasonable results.  相似文献   

12.
We propose a new method to define theories of random geometries, using an explicit and simple map between metrics and large hermitian matrices. We outline some of the many possible applications of the formalism. For example, a background-independent measure on the space of metrics can be easily constructed from first principles. Our framework suggests the relevance of a new gravitational effective action and we show that it occurs when coupling the massive scalar field to two-dimensional gravity. This yields new types of quantum gravity models generalizing the standard Liouville case.  相似文献   

13.
The purpose of this article is to propose a new method to define and calculate path integrals over metrics on a Kähler manifold. The main idea is to use finite dimensional spaces of Bergman metrics, as an approximation to the full space of Kähler metrics. We use the theory of large deviations to decide when a sequence of probability measures on the spaces of Bergman metrics tends to a limit measure on the space of all Kähler metrics. Several examples are considered.  相似文献   

14.
Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. Vulnerability prediction is a mechanism that facilitates the identification (and, in turn, the mitigation) of vulnerabilities early enough during the software development cycle. The scientific community has recently focused a lot of attention on developing Deep Learning models using text mining techniques for predicting the existence of vulnerabilities in software components. However, there are also studies that examine whether the utilization of statically extracted software metrics can lead to adequate Vulnerability Prediction Models. In this paper, both software metrics- and text mining-based Vulnerability Prediction Models are constructed and compared. A combination of software metrics and text tokens using deep-learning models is examined as well in order to investigate if a combined model can lead to more accurate vulnerability prediction. For the purposes of the present study, a vulnerability dataset containing vulnerabilities from real-world software products is utilized and extended. The results of our analysis indicate that text mining-based models outperform software metrics-based models with respect to their F2-score, whereas enriching the text mining-based models with software metrics was not found to provide any added value to their predictive performance.  相似文献   

15.
Using the formalism of geometrothermodynamics, we investigate the geometric properties of the equilibrium manifold for diverse thermodynamic systems. Starting from Legendre invariant metrics of the phase manifold, we derive thermodynamic metrics for the equilibrium manifold whose curvature becomes singular at those points where phase transitions of first and second order occur. We conclude that the thermodynamic curvature of the equilibrium manifold, as defined in geometrothermodynamics, can be used as a measure of thermodynamic interaction in diverse systems with two and three thermodynamic degrees of freedom.  相似文献   

16.
We write an ansatz for quasi-Einstein Kähler metrics and construct new complete examples. Moreover, we construct new compact generalized quasi-Einstein Kähler metrics on some ruled surfaces, including some of Guan's examples as special cases.  相似文献   

17.
In this paper, we propose a new centrality measure for ranking the nodes and time layers of temporal networks simultaneously, referred to as the f-PageRank centrality. The f-PageRank values of nodes and time layers in temporal networks are obtained by solving the eigenvector of a multi-homogeneous map. The existence and uniqueness of the proposed centrality measure are also guaranteed by existing results, under some reasonable conditions. The numerical experiments on a synthetic temporal network and two real-world temporal networks (i.e., Email-Eu-core and CollegeMsg temporal networks) show that the proposed centrality outperforms some existing centrality measures.  相似文献   

18.
19.
Under the explicit violation of the general covariance to the unimodular one, the effect of the emerging scalar graviton on the static spherically symmetric metrics is studied. The main results are threefold. First, there appears the two-parametric family of such metrics, instead of the one-parametric black-hole family in General Relativity (GR). Second, there may exist the one-parametric subfamily describing a peculiar object, the “graviball,” missing in GR. Third, in a simplifying assumption, all the metrics possess the correct Newtonian limit as in GR. The text was submitted by the authors in English.  相似文献   

20.
We review a construction of quaternionic Kähler metrics starting from a rank 2 distribution in 5 dimensions. We relate it to a more general theory about Einstein deformations of symmetric metrics. Finally we ask some questions on complete metrics and relate them to a Zoll phenomenon.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号