共查询到20条相似文献,搜索用时 46 毫秒
1.
Tao LIAN Lin DU Mingfu ZHAO Chaoran CUI Zhumin CHEN Jun MA 《Frontiers of Computer Science》2020,14(3):143603-158
Matrix factorization(MF)methods have superior recommendation performance and are flexible to incorporate other side information,but it is hard for humans to interpret the derived latent factors.Recently,the item-item cooccurrence information is exploited to learn item embeddings and enhance the recommendation performance.However,the item-item co-occurrence information,constructed from the sparse and long-tail distributed user-item interaction matrix,is over-estimated for rare items,which could lead to bias in learned item embeddings.In this paper,we seek to evaluate and improve the interpretability of item embeddings by leveraging a dense item-tag relevance matrix.Specifically,we design two metrics to quantitatively evaluate the interpretability of item embeddings from different viewpoints:interpretability of individual dimensions of item embeddings and semantic coherence of local neighborhoods in the latent space.We also propose a tag-informed item embedding(TIE)model that jointly factorizes the user-item interaction matrix,the item-item co-occurrence matrix and the item-tag relevance matrix with shared item embeddings so that different forms of information can co-operate with each other to learn better item embeddings.Experiments on the MovieLens20M dataset demonstrate that compared with other state-of-the-art MF methods,TIE achieves better top-N recommendations,and the relative improvement is larger when the user-item interaction matrix becomes sparser.By leveraging the itemtag relevance information,individual dimensions of item embeddings are more interpretable and local neighborhoods in the latent space are more semantically coherent;the bias in learned item embeddings are also mitigated to some extent. 相似文献
2.
In this paper,the absolute stability of Lurie control system with probabilistic time-varying delay is studied. By using a new extended Lyapunov-Krasovskii functional,an improved stability criterion based on LMIs is presented and its solvability heavily depends on the sizes of both the delay range and its derivatives,which has wider application fields than those present results.The efficiency and reduced conservatism of the presented results can be demonstrated by two numerical examples with giving some comparing results. 相似文献
3.
Non-negative matrix factorization (NMF) is a useful technique to learn a parts-based representation by decomposing the original data matrix into a basis set and coefficients with non-negative constraints. However, as an unsupervised method, the original NMF cannot utilize the discriminative class information. In this paper, we propose a semi-supervised class-driven NMF method to associate a class label with each basis vector by introducing an inhomogeneous representation cost constraint. This constraint forces the learned basis vectors to represent better for their own classes but worse for the others. Therefore, data samples in the same class will have similar representations, and consequently the discriminability in new representations could be boosted. Some experiments carried out on several standard databases validate the effectiveness of our method in comparison with the state-of-the-art approaches. 相似文献
4.
5.
Software security is becoming an important concern as software applications are increasingly depending on the Internet, an untrustworthy computing environment. Vulnerabilities due to design errors, inconsistencies, incompleteness, and missing constraints in software design can be wrongly exploited by security attacks. Software functionality and security, however, are often handled separately in the development process. Software is designedwith the mindset of its functionalities and cost, where the focus is mainly on the operational behavior. Security concerns, on the other hand, are often described in an imprecise way and open to subjective interpretations. This paper presents a threat driven approach that improves on the quality of software through the realization of a more secure model. The approach introduces systematic transformation rules and integration steps for integrating attack tree representations into statechart-based functional models. Through the focus on the behavior of an attack from the perspective of the system behavior, software engineers can clearly define and understand security concerns as software is designed. Security analysis and threat identification are then applied to the integrated model in order to identify and mitigate vulnerabilities at the design level. 相似文献
6.
ZHANG ZhongYuan 《中国科学:信息科学(英文版)》2013,(7):178-189
Discovering community structures is a fundamental problem concerning how to understand the topology and the functions of complex network. In this paper, we propose how to apply dictionary learning algorithm to community structure detection. We present a new dictionary learning algorithm and systematically compare it with other state-of-the-art models/algorithms. The results show that the proposed algorithm is highly effectively at finding the community structures in both synthetic datasets, including three types of data structures, and real world networks coming from different areas. 相似文献
7.
Ming HE Hao GUO Guangyi LV Le WU Yong GE Enhong CHEN Haiping MA 《Frontiers of Computer Science》2020,14(2):273-290
Recently,many online Karaoke(KTV)platforms have been released,where music lovers sing songs on these platforms.In the meantime,the system automatically evaluates user proficiency according to their singing behavior.Recommending approximate songs to users can initialize singers5 participation and improve users,loyalty to these platforms.However,this is not an easy task due to the unique characteristics of these platforms.First,since users may be not achieving high scores evaluated by the system on their favorite songs,how to balance user preferences with user proficiency on singing for song recommendation is still open.Second,the sparsity of the user-song interaction behavior may greatly impact the recommendation task.To solve the above two challenges,in this paper,we propose an informationfused song recommendation model by considering the unique characteristics of the singing data.Specifically,we first devise a pseudo-rating matrix by combing users’singing behavior and the system evaluations,thus users'preferences and proficiency are leveraged.Then we mitigate the data sparsity problem by fusing users*and songs'rich information in the matrix factorization process of the pseudo-rating matrix.Finally,extensive experimental results on a real-world dataset show the effectiveness of our proposed model. 相似文献
8.
Mohammed Agh Konstantinos Kanistras Matthew J. Rutherfor Kimon P. Valavanis 《控制理论与应用(英文版)》2020,18(1):1-18
This paper presents a system identification method to derive accurate mathematical models for an unmanned circulation control aerial vehicle (UC$^{2}$AV) that account for the effects of circulation control (CC) on the vehicle dynamics. The X-plane flight simulator and the CIFER system identification software are utilized to first derive simulation models to verify and validate the proposed system identification methodology. This is followed by flight tests to derive mathematical models and stability derivatives for the aircraft with CC-on and CC-off. Flight tests indicate a nose down pitching moment effect induced by CC, which in turn alter the UAV trim values and dynamics. Analysis of the two sets of mathematical models reveal that CC changes the longitudinal trim values and improves the lateral maneuverability of the UAV. Verification experiments indicate an acceptable match between the derived models and UAV dynamics by calculating root mean square (RMS) error values and by quantifying the model predictive ability through calculating the Theil inequality coefficient (TIC). 相似文献
9.
This paper considers the optimal model reduction problem of matrix second-order linear systems in the sense of Hilbert-Schmidt-Hankel norm, with the reduced order systems preserving the structure of the original systems. The expressions of the error function and its gradient are derived. Two numerical examples are given to illustrate the presented model reduction technique. 相似文献
10.
Photo-consistency estimation is an important part for many image-based modeling techniques.This paper presents a novel radiance-based color calibration method to reduce the uncertainty of photo-consistency estimation across multiple cameras.The idea behind our method is to convert colors into a uniform radiometric color space in which multiple image data are corrected.Experimental results demonstrate that our method can achieve comparable color calibration effect without adjusting camera parameters and is more robust than other existing method.Additionally,we obtain an auto-determined threshold for photo-consistency check,which will lead to a better performance than existing photo-consistency based reconstruction algorithms. 相似文献
11.
The problem of low-rank matrix factorization with missing data has attracted many significant attention in the fields related to computer vision. The previous model mainly minimizes the total errors of the recovered low-rank matrix on observed entries. It may produce an optimal solution with less physical meaning. This paper gives a theoretical analysis of the sensitivities of the original model and proposes a modified constrained model and iterative methods for solving the constrained problem. We show that solutions of original model can be arbitrarily far from each others. Two kinds of sufficient conditions of this catastrophic phenomenon are given. In general case, we also give a low bound of error between an ?-optimal solution that is practically obtained in computation and a theoretically optimal solution. A constrained model on missing entries is considered for this missing data problem. We propose a two-step projection method for solving the constrained problem. We also modify the method by a successive alternate technique. The proposed algorithm, named as SALS, is easy to implement, as well as converges very fast even for a large matrix. Numerical experiments on simulation data and real examples are given to illuminate the algorithm behaviors of SALS. 相似文献
12.
Serhat S. Bucak Author Vitae Author Vitae 《Pattern recognition》2009,42(5):788-797
In this paper we introduce an incremental non-negative matrix factorization (INMF) scheme in order to overcome the difficulties that conventional NMF has in online processing of large data sets. The proposed scheme enables incrementally updating its factors by reflecting the influence of each observation on the factorization appropriately. This is achieved via a weighted cost function which also allows controlling the memorylessness of the factorization. Unlike conventional NMF, with its incremental nature and weighted cost function the INMF scheme successfully utilizes adaptability to dynamic data content changes with a lower computational complexity. Test results reported for two video applications, namely background modeling in video surveillance and clustering, demonstrate that INMF is capable of online representing data content while reducing dimension significantly. 相似文献
13.
将矩阵An×n的Doolittle分解推广到Am×n上,并在常规的迭代算法上加以创新,给出了递归的分解算法.在实现算法的过程中,对数据进行了巧妙处理,使中间数据及最终计算结果都具有分数形式,提高了结果的精确度,而且更符合人们阅读的习惯.经过运行测试,算法设计合理,程序运行高效准确.程序是对MathSoft公司的交互式的数学文字软件Mathcad的矩阵分解的数值计算扩充到符号运算. 相似文献
14.
In this paper, we present a new method, called large margin based nonnegative matrix factorization (LMNMF), to encode latent discriminant information in training data. LMNMF seeks a nonnegative subspace such that k nearest neighbors of each sample always belong to same class and samples from different classes are separated by a large margin. In the subspace, the local separation structure of data is explicit. The large-margin criterion leads to a new objective function, and a convergency provable multiplicative nonnegative updating rule is derived to learn the basis matrix and encoding vectors. Then, partial least squares regression (PLSR) learns the mapping from the original data to low dimensional representations in order to capture local separation information. PLSR offers a unified solution to out-of-sample extension problem. Extensive experimental results demonstrate LMNMF with PLSR leads significant improvements on classification than several other commonly used NMF-based algorithms. 相似文献
15.
This paper presents an algorithm for the construction of a solution of the generalized Lyapunov equation. It is proved that the polynomial matrix factorization relative to the imaginary axis may be reduced to the successive solution of Lyapunov equations, i.e. the factorization is reduced to the solution of a sequence of generalized Lyapunov equations, not to the solution of generalized Riccati equation. 相似文献
16.
Collaborative filtering (CF) is a data analysis task appearing in many challenging applications, in particular data mining in Internet and e-commerce. CF can often be formulated as identifying patterns in a large and mostly empty rating matrix. In this paper, we focus on predicting unobserved ratings. This task is often a part of a recommendation procedure. We propose a new CF approach called interlaced generalized linear models (GLM); it is based on a factorization of the rating matrix and uses probabilistic modeling to represent uncertainty in the ratings. The advantage of this approach is that different configurations, encoding different intuitions about the rating process can easily be tested while keeping the same learning procedure. The GLM formulation is the keystone to derive an efficient learning procedure, applicable to large datasets. We illustrate the technique on three public domain datasets. 相似文献
17.
付立东 《计算机工程与设计》2010,31(11)
为有效地检测复杂网络中的社团结构,优化了评估与发现社团的模块密度函数(即D值).通过模块密度的优化进程,证明了模块函数的最大化与非负矩阵分解目标函数(SNMF)的等价性.基于这种等价性,设计了一种新的基于模块密度函SNMF算法,并且讨论了该算法的复杂性.在一个经典的计算机产生的随机网络中检验了该算法,特别地,当社团结构变模糊时,实验结果表明该算法在发现复杂网络社团上是有效的. 相似文献
18.
Bradley Klingenberg Author Vitae James Curry Author VitaeAuthor Vitae 《Pattern recognition》2009,42(5):918-435
Non-negative matrix factorization (NMF) has been proposed as a mathematical tool for identifying the components of a dataset. However, popular NMF algorithms tend to operate slowly and do not always identify the components which are most representative of the data. In this paper, an alternative algorithm for performing NMF is developed using the geometry of the problem. The computational costs of the algorithm are explored, and it is shown to successfully identify the components of a simulated dataset. The development of the geometric algorithm framework illustrates the ill-posedness of the NMF problem and suggests that NMF is not sufficiently constrained to be applied successfully outside of a particular class of problems. 相似文献
19.
《国际计算机数学杂志》2012,89(3-4):279-319
In the finite difference/element discretisation of boundary value problems involving partial differential equations there occurs the problem of solving large order systems of banded linear systems. Previously, direct methods of solution considered were the usual Gaussian elimination and LU decomposition strategies. In this paper an alternative factorization strategy is presented. 相似文献
20.
An explicit solution to polynomial matrix right coprime factorization with application in eigenstructure assignment 总被引:1,自引:0,他引:1
In this paper, an explicit solution to polynomial matrix right coprime factorization of input-state transfer function is obtained in terms of the Krylov matrix and the Pseudo-controllability indices of the pair of coefficient matrices. The proposed approach only needs to solve a series of linear equations. Applications of this solution to a type of generalized Sylvester matrix equations and the problem of parametric eigenstructure assignment by state feedback are investigated. These new solutions are simple, they possess better structural properties and are very convenient to use. An example shows the effect of the proposed results. 相似文献