首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 588 毫秒
1.
Session-based recommendations aim to predict a user’s next click based on the user’s current and historical sessions, which can be applied to shopping websites and APPs. Existing session-based recommendation methods cannot accurately capture the complex transitions between items. In addition, some approaches compress sessions into a fixed representation vector without taking into account the user’s interest preferences at the current moment, thus limiting the accuracy of recommendations. Considering the diversity of items and users’ interests, a personalized interest attention graph neural network (PIA-GNN) is proposed for session-based recommendation. This approach utilizes personalized graph convolutional networks (PGNN) to capture complex transitions between items, invoking an interest-aware mechanism to activate users’ interest in different items adaptively. In addition, a self-attention layer is used to capture long-term dependencies between items when capturing users’ long-term preferences. In this paper, the cross-entropy loss is used as the objective function to train our model. We conduct rich experiments on two real datasets, and the results show that PIA-GNN outperforms existing personalized session-aware recommendation methods.  相似文献   

2.
The successful diffusion of mobile applications in user groups can establish a good image for enterprises, gain a good reputation, fight for market share, and create commercial profits. Thus, it is of great significance for the successful diffusion of mobile applications to study mobile application diffusion and social network coevolution. Firstly, combined with a social network’s dynamic change characteristics in real life, a mobile application users’ social network evolution mechanism was designed. Then, a multi-agent model of the coevolution of a social network and mobile application innovation diffusion was constructed. Finally, the impact of mobile applications’ value perception revenue, use cost, marketing promotion investment, and the number of seed users on the coevolution of social network and mobile application diffusion were analyzed. The results show that factors such as the network structure, the perceived value income, the cost of use, the marketing promotion investment, and the number of seed users have an important impact on mobile application diffusion.  相似文献   

3.
Currently, deep learning has shown state-of-the-art performance in image classification with pre-defined taxonomy. However, in a more real-world scenario, different users usually have different classification intents given an image collection. To satisfactorily personalize the requirement, we propose an interactive image classification system with an offline representation learning stage and an online classification stage. During the offline stage, we learn a deep model to extract the feature with higher flexibility and scalability for different users’ preferences. Instead of training the model only with the inter-class discrimination, we also encode the similarity between the semantic-embedding vectors of the category labels into the model. This makes the extracted feature adapt to multiple taxonomies with different granularities. During the online session, an annotation task iteratively alternates with a high-throughput verification task. When performing the verification task, the users are only required to indicate the incorrect prediction without giving the exact category label. For each iteration, our system chooses the images to be annotated or verified based on interactive efficiency optimization. To provide a high interactive rate, a unified active learning algorithm is used to search the optimal annotation and verification set by minimizing the expected time cost. After interactive annotation and verification, the new classified images are used to train a customized classifier online, which reflects the user-adaptive intent of categorization. The learned classifier is then used for subsequent annotation and verification tasks. Experimental results under several public image datasets show that our method outperforms existing methods.  相似文献   

4.
Identifying users across social media has practical applications in many research areas, such as user behavior prediction, commercial recommendation systems, and information retrieval. In this paper, we propose a multiple salient features-based user identification across social media (MSF-UI), which extracts and fuses the rich redundant features contained in user display name, network topology, and published content. According to the differences between users’ different features, a multi-module calculation method is used to obtain the similarity between various redundant features. Finally, the bidirectional stable marriage matching algorithm is used for user identification across social media. Experimental results show that: (1) Compared with single-attribute features, the multi-dimensional information generated by users is integrated to optimize the universality of user identification; (2) Compared with baseline methods such as ranking-based cross-matching (RCM) and random forest confirmation algorithm based on stable marriage matching (RFCA-SMM), this method can effectively improve precision rate, recall rate, and comprehensive evaluation index (F1).  相似文献   

5.
Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.  相似文献   

6.
Satellite communication is expected to play a vital role in realizing Internet of Remote Things (IoRT) applications. This article considers an intelligent reflecting surface (IRS)-assisted downlink low Earth orbit (LEO) satellite communication network, where IRS provides additional reflective links to enhance the intended signal power. We aim to maximize the sum-rate of all the terrestrial users by jointly optimizing the satellite’s precoding matrix and IRS’s phase shifts. However, it is difficult to directly acquire the instantaneous channel state information (CSI) and optimal phase shifts of IRS due to the high mobility of LEO and the passive nature of reflective elements. Moreover, most conventional solution algorithms suffer from high computational complexity and are not applicable to these dynamic scenarios. A robust beamforming design based on graph attention networks (RBF-GAT) is proposed to establish a direct mapping from the received pilots and dynamic network topology to the satellite and IRS’s beamforming, which is trained offline using the unsupervised learning approach. The simulation results corroborate that the proposed RBF-GAT approach can achieve more than 95% of the performance provided by the upper bound with low complexity.  相似文献   

7.
W. Fan  K.H. Yeung 《Physica A》2011,390(2):189-197
Online social network services have attracted more and more users in recent years. So the security of social networks becomes a critical problem. In this paper, we propose a virus propagation model based on the application network of Facebook, which is the most popular among these social network service providers. We also study the virus propagation with an email virus model and compare the behaviors of a virus spreading on Facebook with the original email network. It is found that Facebook provides the same chance for a virus spreading while it gives a platform for application developers. And a virus will spread faster in the Facebook network if users of Facebook spend more time on it.  相似文献   

8.
We introduce a quantum key distribution protocol using mean multi-kings’ problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users’ information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users’ systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.  相似文献   

9.
As a serious worldwide problem, suicide often causes huge and irreversible losses to families and society. Therefore, it is necessary to detect and help individuals with suicidal ideation in time. In recent years, the prosperous development of social media has provided new perspectives on suicide detection, but related research still faces some difficulties, such as data imbalance and expression implicitness. In this paper, we propose a Deep Hierarchical Ensemble model for Suicide Detection (DHE-SD) based on a hierarchical ensemble strategy, and construct a dataset based on Sina Weibo, which contains more than 550 thousand posts from 4521 users. To verify the effectiveness of the model, we also conduct experiments on a public Weibo dataset containing 7329 users’ posts. The proposed model achieves the best performance on both the constructed dataset and the public dataset. In addition, in order to make the model applicable to a wider population, we use the proposed sentence-level mask mechanism to delete user posts with strong suicidal ideation. Experiments show that the proposed model can still effectively identify social media users with suicidal ideation even when the performance of the baseline models decrease significantly.  相似文献   

10.
Due to the popularity and growth of online social networks, security in these networks becomes a critical problem. Previous works have proved that a virus can spread effectively in social networks. In this paper, groups in social networks are studied. We notice that groups on social network services sites can assemble people with similar characteristics, which may promote virus propagation in these networks. After our analysis, it is found that the use of groups can shorten the distance among users, and hence it would cause faster virus spread. We propose a virus propagation model and simulate it in a group network to show the assembly effect of groups. Our result shows that even with only one random attack, a virus can still spread rapidly, and the direct contact among group members is the reason for fast spreading.  相似文献   

11.
Text classification is a fundamental research direction, aims to assign tags to text units. Recently, graph neural networks (GNN) have exhibited some excellent properties in textual information processing. Furthermore, the pre-trained language model also realized promising effects in many tasks. However, many text processing methods cannot model a single text unit’s structure or ignore the semantic features. To solve these problems and comprehensively utilize the text’s structure information and semantic information, we propose a Bert-Enhanced text Graph Neural Network model (BEGNN). For each text, we construct a text graph separately according to the co-occurrence relationship of words and use GNN to extract text features. Moreover, we employ Bert to extract semantic features. The former part can take into account the structural information, and the latter can focus on modeling the semantic information. Finally, we interact and aggregate these two features of different granularity to get a more effective representation. Experiments on standard datasets demonstrate the effectiveness of BEGNN.  相似文献   

12.
Social structure of Facebook networks   总被引:1,自引:0,他引:1  
We study the social structure of Facebook “friendship” networks at one hundred American colleges and universities at a single point in time, and we examine the roles of user attributes–gender, class year, major, high school, and residence–at these institutions. We investigate the influence of common attributes at the dyad level in terms of assortativity coefficients and regression models. We then examine larger-scale groupings by detecting communities algorithmically and comparing them to network partitions based on user characteristics. We thereby examine the relative importance of different characteristics at different institutions, finding for example that common high school is more important to the social organization of large institutions and that the importance of common major varies significantly between institutions. Our calculations illustrate how microscopic and macroscopic perspectives give complementary insights on the social organization at universities and suggest future studies to investigate such phenomena further.  相似文献   

13.
The duplication–divergence mechanism of network growth has been widely investigated, especially in gene and protein networks. Both the duplication and divergence have a key role in biological network evolution. However, the relative roles of these mechanisms in the influence of disassortative property in protein interaction networks remain to be clarified. It has been shown that duplication can indeed make protein networks evolve towards disassortative networks. To make the relationship between the disassortative property and the duplication–divergence mechanism more clear, we further discuss how the divergence mechanism influences the disassortative property. We tested four different divergence mechanisms, i.e., node deletion, edge deletion, edge addition, and edge rewiring to study their effects on disassortative property. Our study highlights the crucial roles of different divergence evolution mechanisms.  相似文献   

14.
Based on the characteristics of rumor spreading in online social networks, this paper proposes a new rumor spreading model. This is an improved SIS rumor spreading model in online social networks that combines the transmission dynamics and population dynamics with consideration of the impact of both of the changing number of online social network users and different levels of user activity. We numerically simulate the rumor spreading process. The results of numerical simulation show that the improved SIS model can successfully characterize the rumor spreading behavior in online social networks. We also give the effective strategies of curbing the rumor spreading in online social networks.  相似文献   

15.
Modeling the information of social contagion processes has recently attracted a substantial amount of interest from researchers due to its wide applicability in network science, multi-agent-systems, information science, and marketing. Unlike in biological spreading, the existence of a reinforcement effect in social contagion necessitates considering the complexity of individuals in the systems. Although many studies acknowledged the heterogeneity of the individuals in their adoption of information, there are no studies that take into account the individuals’ uncertainty during their adoption decision-making. This resulted in less than optimal modeling of social contagion dynamics in the existence of phase transition in the final adoption size versus transmission probability. We employed the Inverse Born Problem (IBP) to represent probabilistic entities as complex probability amplitudes in edge-based compartmental theory, and demonstrated that our novel approach performs better in the prediction of social contagion dynamics through extensive simulations on random regular networks.  相似文献   

16.
Digital Signature using Self-Image signing is introduced in this paper. This technique is used to verify the integrity and originality of images transmitted over insecure channels. In order to protect the user’s medical images from changing or modifying, the images must be signed. The proposed approach uses the Discrete Wavelet Transform to subdivide a picture into four bands and the Discrete Cosine Transform DCT is used to embed a mark from each sub-band to another sub-band of DWT according to a determined algorithm. To increase the security, the marked image is then encrypted using Double Random Phase Encryption before transmission over the communication channel. By verifying the presence of the mark, the authority of the sender is verified at the receiver. Authorized users’ scores should, in theory, always be higher than illegal users’ scores. If this is the case, a single threshold might be used to distinguish between authorized and unauthorized users by separating the two sets of scores. The results are compared to those obtained using an approach that does not employ DWT.  相似文献   

17.
Modelling the epidemic’s spread on multiplex networks, considering complex human behaviours, has recently gained the attention of many scientists. In this work, we study the interplay between epidemic spreading and opinion dynamics on multiplex networks. An agent in the epidemic layer could remain in one of five distinct states, resulting in the SIRQD model. The agent’s attitude towards respecting the restrictions of the pandemic plays a crucial role in its prevalence. In our model, the agent’s point of view could be altered by either conformism mechanism, social pressure, or independent actions. As the underlying opinion model, we leverage the q-voter model. The entire system constitutes a coupled opinion–dynamic model where two distinct processes occur. The question arises of how to properly align these dynamics, i.e., whether they should possess equal or disparate timescales. This paper highlights the impact of different timescales of opinion dynamics on epidemic spreading, focusing on the time and the infection’s peak.  相似文献   

18.
黄飞虎  彭舰  宁黎苗 《物理学报》2014,63(16):160501-160501
随着网络服务的发展,社交网络逐渐成为信息传播的新媒介.因此,研究网络舆情演化具有重要意义和实用价值.为了更好地研究网络舆论,在信息熵的基础上,提出了一个社交网络观点演化模型.此模型存在以下两个特点:一是可以反映个体面对正负两种观点趋向做出抉择时的心理过程;二是可以反映个体形成新观点时主观因素和客观因素的影响.在仿真实验中,讨论了舆论环境对个体观点演化的影响,初始观点和自信度对观点演化的影响,以及意见领袖对群体观点演化的影响.实验结果表明,该模型可以反映真实社交网络中个体的心理学特征,比如个体的观点形成会受到舆论环境的影响,自信的个体不愿意接受他人的观点,当意见领袖存在时群体的观点会受到影响等.  相似文献   

19.
基于平均场理论的微博传播网络模型   总被引:1,自引:0,他引:1       下载免费PDF全文
吴腾飞  周昌乐  王小华  黄孝喜  谌志群  王荣波 《物理学报》2014,63(24):240501-240501
微博是在通过用户关注机制建立的用户网络上分享实时信息的社交平台,而微博消息主要通过用户的转发行为使消息在用户网络上传播.掌握微博消息的传播机制,对研究微博上舆论谣言的传播、产品推广等具有指导作用.本文通过对微博传播网络的结构分析来探索微博传播过程,利用新浪微博数据,建立微博传播网络,分析该网络的生成机制,使用平均场论的方法,推导微博传播网络的度分布模型.实验结果表明:微博传播网络的度分布是时间相依的,在特定时间下网络的度分布服从幂律分布.  相似文献   

20.
Chromosome karyotype analysis is of great clinical importance in the diagnosis and treatment of diseases. Since manual analysis is highly time and effort consuming, computer-assisted automatic chromosome karyotype analysis based on images is routinely used to improve the efficiency and accuracy of the analysis. However, the strip-shaped chromosomes easily overlap each other when imaged, significantly affecting the accuracy of the subsequent analysis and hindering the development of chromosome analysis instruments. In this paper, we present an adversarial, multiscale feature learning framework to improve the accuracy and adaptability of overlapping chromosome segmentation. We first adopt the nested U-shaped network with dense skip connections as the generator to explore the optimal representation of the chromosome images by exploiting multiscale features. Then we use the conditional generative adversarial network (cGAN) to generate images similar to the original ones; the training stability of the network is enhanced by applying the least-square GAN objective. Finally, we replace the common cross-entropy loss with the advanced Lovász-Softmax loss to improve the model’s optimization and accelerate the model’s convergence. Comparing with the established algorithms, the performance of our framework is proven superior by using public datasets in eight evaluation criteria, showing its great potential in overlapping chromosome segmentation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号