期刊文献+
共找到1,088篇文章
< 1 2 55 >
每页显示 20 50 100
Requirements ranking based on crowd-sourcing high-end product USs
1
作者 MA Yufeng DOU Yajie +2 位作者 XU Xiangqian JIA Qingyang TAN Yuejin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期94-104,共11页
Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured... Based on the characteristics of high-end products,crowd-sourcing user stories can be seen as an effective means of gathering requirements,involving a large user base and generating a substantial amount of unstructured feedback.The key challenge lies in transforming abstract user needs into specific ones,requiring integration and analysis.Therefore,we propose a topic mining-based approach to categorize,summarize,and rank product requirements from user stories.Specifically,after determining the number of story categories based on py LDAvis,we initially classify“I want to”phrases within user stories.Subsequently,classic topic models are applied to each category to generate their names,defining each post-classification user story category as a requirement.Furthermore,a weighted ranking function is devised to calculate the importance of each requirement.Finally,we validate the effectiveness and feasibility of the proposed method using 2966 crowd-sourced user stories related to smart home systems. 展开更多
关键词 high-end product complex system crowd-sourcing user stories topic mining requirements ranking
下载PDF
Fusion of Feature Ranking Methods for an Effective Intrusion Detection System
2
作者 Seshu Bhavani Mallampati Seetha Hari 《Computers, Materials & Continua》 SCIE EI 2023年第8期1721-1744,共24页
Expanding internet-connected services has increased cyberattacks,many of which have grave and disastrous repercussions.An Intrusion Detection System(IDS)plays an essential role in network security since it helps to pr... Expanding internet-connected services has increased cyberattacks,many of which have grave and disastrous repercussions.An Intrusion Detection System(IDS)plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks.Although extensive research was reported in IDS,detecting novel intrusions with optimal features and reducing false alarm rates are still challenging.Therefore,we developed a novel fusion-based feature importance method to reduce the high dimensional feature space,which helps to identify attacks accurately with less false alarm rate.Initially,to improve training data quality,various preprocessing techniques are utilized.The Adaptive Synthetic oversampling technique generates synthetic samples for minority classes.In the proposed fusion-based feature importance,we use different approaches from the filter,wrapper,and embedded methods like mutual information,random forest importance,permutation importance,Shapley Additive exPlanations(SHAP)-based feature importance,and statistical feature importance methods like the difference of mean and median and standard deviation to rank each feature according to its rank.Then by simple plurality voting,the most optimal features are retrieved.Then the optimal features are fed to various models like Extra Tree(ET),Logistic Regression(LR),Support vector Machine(SVM),Decision Tree(DT),and Extreme Gradient Boosting Machine(XGBM).Then the hyperparameters of classification models are tuned with Halving Random Search cross-validation to enhance the performance.The experiments were carried out on the original imbalanced data and balanced data.The outcomes demonstrate that the balanced data scenario knocked out the imbalanced data.Finally,the experimental analysis proved that our proposed fusionbased feature importance performed well with XGBM giving an accuracy of 99.86%,99.68%,and 92.4%,with 9,7 and 8 features by training time of 1.5,4.5 and 5.5 s on Network Security Laboratory-Knowledge Discovery in Databases(NSL-KDD),Canadian Institute for Cybersecurity(CIC-IDS 2017),and UNSW-NB15,datasets respectively.In addition,the suggested technique has been examined and contrasted with the state of art methods on three datasets. 展开更多
关键词 Cyber security feature ranking IMBALANCE PREPROCESSING IDS SHAP
下载PDF
Google Scholar University Ranking Algorithm to Evaluate the Quality of Institutional Research
3
作者 Noor Ul Sabah Muhammad Murad Khan +3 位作者 Ramzan Talib Muhammad Anwar Muhammad Sheraz Arshad Malik Puteri Nor Ellyza Nohuddin 《Computers, Materials & Continua》 SCIE EI 2023年第6期4955-4972,共18页
Education quality has undoubtedly become an important local and international benchmark for education,and an institute’s ranking is assessed based on the quality of education,research projects,theses,and dissertation... Education quality has undoubtedly become an important local and international benchmark for education,and an institute’s ranking is assessed based on the quality of education,research projects,theses,and dissertations,which has always been controversial.Hence,this research paper is influenced by the institutes ranking all over the world.The data of institutes are obtained through Google Scholar(GS),as input to investigate the United Kingdom’s Research Excellence Framework(UK-REF)process.For this purpose,the current research used a Bespoke Program to evaluate the institutes’ranking based on their source.The bespoke program requires changes to improve the results by addressing these methodological issues:Firstly,Redundant profiles,which increased their citation and rank to produce false results.Secondly,the exclusion of theses and dissertation documents to retrieve the actual publications to count for citations.Thirdly,the elimination of falsely owned articles from scholars’profiles.To accomplish this task,the experimental design referred to collecting data from 120 UK-REF institutes and GS for the present year to enhance its correlation analysis in this new evaluation.The data extracted from GS is processed into structured data,and afterward,it is utilized to generate statistical computations of citations’analysis that contribute to the ranking based on their citations.The research promoted the predictive approach of correlational research.Furthermore,experimental evaluation reported encouraging results in comparison to the previous modi-fication made by the proposed taxonomy.This paper discussed the limitations of the current evaluation and suggested the potential paths to improve the research impact algorithm. 展开更多
关键词 Google scholar institutes ranking research assessment exercise research excellence framework impact evaluation citation data
下载PDF
Advanced DAG-Based Ranking(ADR)Protocol for Blockchain Scalability
4
作者 Tayyaba Noreen Qiufen Xia Muhammad Zeeshan Haider 《Computers, Materials & Continua》 SCIE EI 2023年第5期2593-2613,共21页
In the past decade,blockchain has evolved as a promising solution to develop secure distributed ledgers and has gained massive attention.However,current blockchain systems face the problems of limited throughput,poor ... In the past decade,blockchain has evolved as a promising solution to develop secure distributed ledgers and has gained massive attention.However,current blockchain systems face the problems of limited throughput,poor scalability,and high latency.Due to the failure of consensus algorithms in managing nodes’identities,blockchain technology is considered inappropriate for many applications,e.g.,in IoT environments,because of poor scalability.This paper proposes a blockchain consensus mechanism called the Advanced DAG-based Ranking(ADR)protocol to improve blockchain scalability and throughput.The ADR protocol uses the directed acyclic graph ledger,where nodes are placed according to their ranking positions in the graph.It allows honest nodes to use theDirect Acyclic Graph(DAG)topology to write blocks and verify transactions instead of a chain of blocks.By using a three-step strategy,this protocol ensures that the system is secured against doublespending attacks and allows for higher throughput and scalability.The first step involves the safe entry of nodes into the system by verifying their private and public keys.The next step involves developing an advanced DAG ledger so nodes can start block production and verify transactions.In the third step,a ranking algorithm is developed to separate the nodes created by attackers.After eliminating attacker nodes,the nodes are ranked according to their performance in the system,and true nodes are arranged in blocks in topological order.As a result,the ADR protocol is suitable for applications in the Internet of Things(IoT).We evaluated ADR on EC2 clusters with more than 100 nodes and achieved better transaction throughput and liveness of the network while adding malicious nodes.Based on the simulation results,this research determined that the transaction’s performance was significantly improved over blockchains like Internet of Things Applications(IOTA)and ByteBall. 展开更多
关键词 Blockchain SCALABILITY directed acyclic graph advanced DAG-based ranking protocol
下载PDF
Modified Computational Ranking Model for Cloud Trust Factor Using Fuzzy Logic
5
作者 Lei Shen Ting Huang +1 位作者 Nishui Cai Hao Wu 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期507-524,共18页
Through the use of the internet and cloud computing,users may access their data as well as the programmes they have installed.It is now more challenging than ever before to choose which cloud service providers to take... Through the use of the internet and cloud computing,users may access their data as well as the programmes they have installed.It is now more challenging than ever before to choose which cloud service providers to take advantage of.When it comes to the dependability of the cloud infrastructure service,those who supply cloud services,as well as those who seek cloud services,have an equal responsibility to exercise utmost care.Because of this,further caution is required to ensure that the appropriate values are reached in light of the ever-increasing need for correct decision-making.The purpose of this study is to provide an updated computational ranking approach for decision-making in an environment with many criteria by using fuzzy logic in the context of a public cloud scenario.This improved computational ranking system is also sometimes referred to as the improvised VlseKriterijumska Optimizacija I Kompromisno Resenje(VIKOR)method.It gives users access to a trustworthy assortment of cloud services that fit their needs.The activity that is part of the suggested technique has been broken down into nine discrete parts for your convenience.To verify these stages,a numerical example has been evaluated for each of the six different scenarios,and the outcomes have been simulated. 展开更多
关键词 CLOUD TRUST computational ranking VIKOR fuzzy
下载PDF
New Ranking of Generalized Quadrilateral Shape Fuzzy Number Using Centroid Technique
6
作者 A.Thiruppathi C.K.Kirubhashankar 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2253-2266,共14页
The output of the fuzzy set is reduced by one for the defuzzification procedure.It is employed to provide a comprehensible outcome from a fuzzy inference process.This page provides further information about the defuzzi... The output of the fuzzy set is reduced by one for the defuzzification procedure.It is employed to provide a comprehensible outcome from a fuzzy inference process.This page provides further information about the defuzzifica-tion approach for quadrilateral fuzzy numbers,which may be used to convert them into discrete values.Defuzzification demonstrates how useful fuzzy ranking systems can be.Our major purpose is to develop a new ranking method for gen-eralized quadrilateral fuzzy numbers.The primary objective of the research is to provide a novel approach to the accurate evaluation of various kinds of fuzzy inte-gers.Fuzzy ranking properties are examined.Using the counterexamples of Lee and Chen demonstrates the fallacy of the ranking technique.So,a new approach has been developed for dealing with fuzzy risk analysis,risk management,indus-trial engineering and optimization,medicine,and artificial intelligence problems:the generalized quadrilateral form fuzzy number utilizing centroid methodology.As you can see,the aforementioned scenarios are all amenable to the solution pro-vided by the generalized quadrilateral shape fuzzy number utilizing centroid methodology.It’s laid out in a straightforward manner that’s easy to grasp for everyone.The rating method is explained in detail,along with numerical exam-ples to illustrate it.Last but not least,stability evaluations clarify why the Gener-alized quadrilateral shape fuzzy number obtained by the centroid methodology outperforms other ranking methods. 展开更多
关键词 Fuzzy numbers quadrilateral fuzzy number ranking methods fuzzy risk analysis
下载PDF
Multi-Criteria Decision-Making for Power Grid Construction Project Investment Ranking Based on the Prospect Theory Improved by Rewarding Good and Punishing Bad Linear Transformation
7
作者 Shun Ma Na Yu +3 位作者 Xiuna Wang Shiyan Mei Mingrui Zhao Xiaoyu Han 《Energy Engineering》 EI 2023年第10期2369-2392,共24页
Using the improved prospect theory with the linear transformations of rewarding good and punishing bad(RGPBIT),a new investment ranking model for power grid construction projects(PGCPs)is proposed.Given the uncertaint... Using the improved prospect theory with the linear transformations of rewarding good and punishing bad(RGPBIT),a new investment ranking model for power grid construction projects(PGCPs)is proposed.Given the uncertainty of each index value under the market environment,fuzzy numbers are used to describe qualitative indicators and interval numbers are used to describe quantitative ones.Taking into account decision-maker’s subjective risk attitudes,a multi-criteria decision-making(MCDM)method based on improved prospect theory is proposed.First,the[−1,1]RGPBIT operator is proposed to normalize the original data,to obtain the best andworst schemes of PGCPs.Furthermore,the correlation coefficients between interval/fuzzy numbers and the best/worst schemes are defined and introduced to the prospect theory to improve its value function and loss function,and the positive and negative prospect value matrices of the project are obtained.Then,the optimization model with the maximum comprehensive prospect value is constructed,the optimal attribute weight is determined,and the PGCPs are ranked accordingly.Taking four PGCPs of the IEEERTS-79 node system as examples,an illustration of the feasibility and effectiveness of the proposed method is provided. 展开更多
关键词 Power grid construction project investment ranking RGPBIT operator MCDM optimal weight
下载PDF
Machine Learning for Hybrid Line Stability Ranking Index in Polynomial Load Modeling under Contingency Conditions
8
作者 P.Venkatesh N.Visali 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期1001-1012,共12页
In the conventional technique,in the evaluation of the severity index,clustering and loading suffer from more iteration leading to more com-putational delay.Hence this research article identifies,a novel progression f... In the conventional technique,in the evaluation of the severity index,clustering and loading suffer from more iteration leading to more com-putational delay.Hence this research article identifies,a novel progression for fast predicting the severity of the line and clustering by incorporating machine learning aspects.The polynomial load modelling or ZIP(constant impedances(Z),Constant Current(I)and Constant active power(P))is developed in the IEEE-14 and Indian 118 bus systems considered for analysis of power system security.The process of finding the severity of the line using a Hybrid Line Stability Ranking Index(HLSRI)is used for assisting the concepts of machine learning with J48 algorithm,infers the superior affected lines by adopting the IEEE standards in concern to be compensated in maintaining the power system stability.The simulation is performed in the WEKA environment and deals with the supervisor learning in order based on severity to ensure the safety of power system.The Unified Power Flow Controller(UPFC),facts devices for the purpose of compensating the losses by maintaining the voltage characteristics.The finite element analysis findings are compared with the existing procedures and numerical equations for authentications. 展开更多
关键词 CONTINGENCY hybrid line stability ranking index(HLSRI) machine learning(ML) unified power flow controller(UPFC) ZIP load modelling
下载PDF
The Effect of Coding Method on Cause-of-Death Rankings
9
作者 Peter Harteloh 《Open Journal of Statistics》 2023年第6期778-788,共11页
Background: Cause-of-death rankings are often used for planning or evaluating health policy measures. In the European Union, some countries produce cause-of-death statistics by a manual coding of death certificates, w... Background: Cause-of-death rankings are often used for planning or evaluating health policy measures. In the European Union, some countries produce cause-of-death statistics by a manual coding of death certificates, while other countries use an automated coding system. The outcome of these two different methods in terms of the selected underlying cause of death for statistics may vary considerably. Therefore, this study explores the effect of coding method on the ranking of countries by major causes of death. Method: Age and sex standardized rates were extracted for 33 European (related) countries from the cause-of-death registry of the European Statistical Office (Eurostat). Wilcoxon’s rank sum test was applied to the ranking of countries by major causes of death. Results: Statistically significant differences due to coding method were identified for dementia, stroke and pneumonia. These differences could be explained by a different selection of dementia or pneumonia as underlying cause of death and by a different certification practice for stroke. Conclusion: Coding method should be taken into account when constructing or interpreting rankings of countries by cause of death. 展开更多
关键词 Cause-of-Death Statistics Cause of Death ranking Automated Coding Manual Coding EPIDEMIOLOGY Health Policy
下载PDF
Ranking of Web Pages in a Personalized Search
10
作者 Mahmoud Abou Ghaly 《Journal of Computer and Communications》 2023年第2期89-101,共13页
The basic idea behind a personalized web search is to deliver search results that are tailored to meet user needs, which is one of the growing concepts in web technologies. The personalized web search presented in thi... The basic idea behind a personalized web search is to deliver search results that are tailored to meet user needs, which is one of the growing concepts in web technologies. The personalized web search presented in this paper is based on exploiting the implicit feedbacks of user satisfaction during her web browsing history to construct a user profile storing the web pages the user is highly interested in. A weight is assigned to each page stored in the user’s profile;this weight reflects the user’s interest in this page. We name this weight the relative rank of the page, since it depends on the user issuing the query. Therefore, the ranking algorithm provided in this paper is based on the principle that;the rank assigned to a page is the addition of two rank values R_rank and A_rank. A_rank is an absolute rank, since it is fixed for all users issuing the same query, it only depends on the link structures of the web and on the keywords of the query. Thus, it could be calculated by the PageRank algorithm suggested by Brin and Page in 1998 and used by the google search engine. While, R_rank is the relative rank, it is calculated by the methods given in this paper which depends mainly on recording implicit measures of user satisfaction during her previous browsing history. 展开更多
关键词 Implicit Feedback Personalized Search Web Page ranking User Profile
下载PDF
Traffic Incident Management Performance Measures: Ranking Agencies on Roadway Clearance Time
11
作者 Maroa Mumtarin Skylar Knickerbocker +1 位作者 Theresa Litteral Jonathan S. Wood 《Journal of Transportation Technologies》 2023年第3期353-368,共16页
This study develops a procedure to rank agencies based on their incident responses using roadway clearance times for crashes. This analysis is not intended to grade agencies but to assist in identifying agencies requi... This study develops a procedure to rank agencies based on their incident responses using roadway clearance times for crashes. This analysis is not intended to grade agencies but to assist in identifying agencies requiring more training or resources for incident management. Previous NCHRP reports discussed usage of different factors including incident severity, roadway characteristics, number of lanes involved and time of incident separately for estimating the performance. However, it does not tell us how to incorporate all the factors at the same time. Thus, this study aims to account for multiple factors to ensure fair comparisons. This study used 149,174 crashes from Iowa that occurred from 2018 to 2021. A Tobit regression model was used to find the effect of different variables on roadway clearance time. Variables that cannot be controlled directly by agencies such as crash severity, roadway type, weather conditions, lighting conditions, etc., were included in the analysis as it helps to reduce bias in the ranking procedure. Then clearance time of each crash is normalized into a base condition using the regression coefficients. The normalization makes the process more efficient as the effect of uncontrollable factors has already been mitigated. Finally, the agencies were ranked by their average normalized roadway clearance time. This ranking process allows agencies to track their performance of previous crashes, can be used in identifying low performing agencies that could use additional resources and training, and can be used to identify high performing agencies to recognize for their efforts and performance. 展开更多
关键词 Traffic Incident Management Roadway Clearance Time Performance Measures and ranking Agency Performance Evaluation Tobit Regression Model
下载PDF
一种基于潜变量的Ranking模型构造算法 被引量:1
12
作者 程凡 李龙澍 +1 位作者 仲红 刘政怡 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第6期739-744,共6页
现有的Ranking算法获得的模型全部来自训练数据,因为很多模型的有用信息并不能完全从训练数据中得到,因此这样得到的模型不够精确,对此,提出一种基于潜变量的Ranking算法。该算法以结构化SVM为学习工具,将除训练数据外的其他有用信息以... 现有的Ranking算法获得的模型全部来自训练数据,因为很多模型的有用信息并不能完全从训练数据中得到,因此这样得到的模型不够精确,对此,提出一种基于潜变量的Ranking算法。该算法以结构化SVM为学习工具,将除训练数据外的其他有用信息以潜变量形式引入算法的框架中,并在此基础上定义了面向NDCG的目标函数。针对该目标函数非凸非平滑,首先使用"凹-凸过程"进行逼近,然后用"近似Bundle法"展开优化计算。基准数据集上的实验结果表明:相比完全依靠训练数据的Ranking算法,本文算法获得的模型更为精确。 展开更多
关键词 ranking算法 潜变量 结构化SVM NDCG 凹-凸过程 近似Bundle法
下载PDF
线性程序的Ranking函数自动合成 被引量:1
13
作者 李骏 李轶 +1 位作者 冯勇 秦小林 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2009年第5期176-181,共6页
针对判定一个程序终止性的经典方法Ranking函数法,运用半代数系统的概念,把程序终止性问题转换为求半代数系统的Ranking函数。然后运用符号计算工具DISCOV-ERER和Farkas引理,求出函数参数存在的充分必要条件,并根据符号计算理论的方法... 针对判定一个程序终止性的经典方法Ranking函数法,运用半代数系统的概念,把程序终止性问题转换为求半代数系统的Ranking函数。然后运用符号计算工具DISCOV-ERER和Farkas引理,求出函数参数存在的充分必要条件,并根据符号计算理论的方法自动合成Ranking函数。通过计算代数理论的证明和试验的验证,并与其他方法做了比较,这种方法是高效合理的。 展开更多
关键词 DISCOVERER Farkas’lemma ranking函数 半代数系统 程序终止性 程序验证
下载PDF
A Review on Ranking of Z-numbers
14
作者 Fırat Bilgin Musa Alci 《Journal of Computer Science Research》 2022年第2期1-12,共12页
There are numerous studies about Z-numbers since its inception in 2011.Because Z-number concept reflects human ability to make rational decisions,Z-number based multi-criteria decision making problems are one of these... There are numerous studies about Z-numbers since its inception in 2011.Because Z-number concept reflects human ability to make rational decisions,Z-number based multi-criteria decision making problems are one of these studies.When the problem is translated from linguistic information into Z-number domain,the important question occurs that which Z-number should be selected.To answer this question,several ranking methods have been proposed.To compare the performances of these methods,benchmark set of fuzzy Z-numbers has been created in time.There are relatively new methods that their performances are not examined yet on this benchmark problem.In this paper,we worked on these studies which are relative entropy based Z-number ranking method and a method for ranking discrete Z-numbers.The authors tried to examine their performances on the benchmark problem and compared the results with the other ranking algorithms.The results are consistent with the literature,mostly.The advantages and the drawbacks of the methods are presented which can be useful for the researchers who are interested in this area. 展开更多
关键词 Fuzzy Z-numbers ranking discrete Z-numbers ranking of Z-numbers Relative entropy based ranking
下载PDF
World-Class Discipline Ranking 2023
15
《评价与管理》 2023年第S01期60-118,共59页
On the basis of ESI data,all universities are ranked in 92 out of 105 world-class disciplines.There is no ESI data(either publications or citations)in the rest of 13 world-class disciplines.
关键词 ranked UNIVERSITIES PUBLICATIONS
下载PDF
基于pairwise的改进ranking算法 被引量:1
16
作者 程凡 仲红 《计算机应用》 CSCD 北大核心 2011年第7期1740-1743,共4页
传统基于pairwise的ranking算法,学习后得到的模型在用NDCG这样的ranking标准评价时效果并不好,对此提出了一种新型ranking算法。该算法也是使用样本对作为训练数据,但定义了一个面向NDCG评估标准的目标函数。针对此目标函数非平滑、难... 传统基于pairwise的ranking算法,学习后得到的模型在用NDCG这样的ranking标准评价时效果并不好,对此提出了一种新型ranking算法。该算法也是使用样本对作为训练数据,但定义了一个面向NDCG评估标准的目标函数。针对此目标函数非平滑、难以直接优化的特点,提出使用割平面算法进行学习,不仅解决了上述问题,而且使算法迭代的次数不再依赖于训练样本对数。最后基于基准数据集的实验证明了算法的有效性。 展开更多
关键词 ranking算法 pairwise方法 支持向量机 NDCG 割平面算法
下载PDF
基于非凸上界的ranking模型构造算法
17
作者 程凡 王煦法 李龙澍 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第4期57-63,共7页
现有的ranking算法均通过最小化原目标函数的凸上界构造ranking模型,得到的模型不够精确.为此,文中提出一种基于非凸上界的ranking算法.该算法首先给出一个基于多类支持向量机(SVM)的框架,然后定义面向NDCG的目标函数,在此基础上设计一... 现有的ranking算法均通过最小化原目标函数的凸上界构造ranking模型,得到的模型不够精确.为此,文中提出一种基于非凸上界的ranking算法.该算法首先给出一个基于多类支持向量机(SVM)的框架,然后定义面向NDCG的目标函数,在此基础上设计一个比现有的凸上界更为紧凑的非凸上界逼近原目标函数;针对上界函数的非凸非光滑,提出使用凹-凸过程进行凸逼近,并采用割平面算法进行求解;最后,通过在基准数据集上的实验对该算法进行验证,并与现有算法进行对比.结果表明,相比现有的基于凸上界的ranking算法,文中算法得到的模型不但更为精确,而且更加稳定. 展开更多
关键词 ranking算法 非凸上界 NDCG 凹-凸过程 割平面算法 多类支持向量机
下载PDF
基于多源知识和Ranking SVM的中文微博命名实体链接 被引量:7
18
作者 陈万礼 昝红英 吴泳钢 《中文信息学报》 CSCD 北大核心 2015年第5期117-124,共8页
命名实体是文本中承载信息的重要单元,正确分析存在歧义的命名实体对文本的理解起着关键性作用。该文提出基于多源知识和Ranking SVM的中文微博命名实体链接,结合同义词词典、百科资源等知识产生初始候选实体集合,同时从文本中抽取多种... 命名实体是文本中承载信息的重要单元,正确分析存在歧义的命名实体对文本的理解起着关键性作用。该文提出基于多源知识和Ranking SVM的中文微博命名实体链接,结合同义词词典、百科资源等知识产生初始候选实体集合,同时从文本中抽取多种组合特征,利用Ranking SVM对候选实体集合进行排序,从而得到目标实体。在NLP&CC20141中文微博实体链接评测数据集上进行了实验,获得了89.40%的平均准确率,与NLP&CC2014中文微博实体链接评测取得最好成绩的系统相比,本文的系统具有一定的优势。 展开更多
关键词 命名实体 中文微博实体链接 同义词词典 百科资源 ranking SVM 语义特征
下载PDF
单纯形算法在统计机器翻译Re-ranking中的应用 被引量:2
19
作者 付雷 刘群 《中文信息学报》 CSCD 北大核心 2007年第3期28-33,共6页
近年来,discriminative re-ranking技术已经被应用到很多自然语言处理相关的分支中,像句法分析,词性标注,机器翻译等,并都取得了比较好的效果,在各自相应的评估标准下都有所提高。本文将以统计机器翻译为例,详细地讲解利用单纯形算法(Si... 近年来,discriminative re-ranking技术已经被应用到很多自然语言处理相关的分支中,像句法分析,词性标注,机器翻译等,并都取得了比较好的效果,在各自相应的评估标准下都有所提高。本文将以统计机器翻译为例,详细地讲解利用单纯形算法(Simplex Algorithm)对翻译结果进行re-rank的原理和过程,算法的实现和使用方法,以及re-rank实验中特征选择的方法,并给出该算法在NIST-2002(开发集)和NIST-2005(测试集)中英文机器翻译测试集合上的实验结果,在开发集和测试集上,BLEU分值分别获得了1.26%和1.16%的提高。 展开更多
关键词 人工智能 机器翻译 discriminative re—ranking 单纯形算法 统计机器翻译
下载PDF
Shuffled complex evolution coupled with stochastic ranking for reservoir scheduling problems 被引量:3
20
作者 Jing-qiao Mao Ming-ming Tian +3 位作者 Teng-fei Hu Kang Ji Ling-quan Dai Hui-chao Dai 《Water Science and Engineering》 EI CAS CSCD 2019年第4期307-318,共12页
This paper introduces an optimization method(SCE-SR)that combines shuffled complex evolution(SCE)and stochastic ranking(SR)to solve constrained reservoir scheduling problems,ranking individuals with both objectives an... This paper introduces an optimization method(SCE-SR)that combines shuffled complex evolution(SCE)and stochastic ranking(SR)to solve constrained reservoir scheduling problems,ranking individuals with both objectives and constrains considered.A specialized strategy is used in the evolution process to ensure that the optimal results are feasible individuals.This method is suitable for handling multiple conflicting constraints,and is easy to implement,requiring little parameter tuning.The search properties of the method are ensured through the combination of deterministic and probabilistic approaches.The proposed SCE-SR was tested against hydropower scheduling problems of a single reservoir and a multi-reservoir system,and its performance is compared with that of two classical methods(the dynamic programming and genetic algorithm).The results show that the SCE-SR method is an effective and efficient method for optimizing hydropower generation and locating feasible regions quickly,with sufficient global convergence properties and robustness.The operation schedules obtained satisfy the basic scheduling requirements of reservoirs. 展开更多
关键词 Reservoir scheduling Optimization method Constraint handling Shuffled complex evolution Stochastic ranking
下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部