期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
An application of insurance mechanism in risk management for energy internet
1
作者 Yang Yunxue Zhang Qin Zhang Libo 《High Technology Letters》 EI CAS 2018年第2期196-202,共7页
As a completely new residential distribution infrastructure,energy internet facilitates transactions of equipment,energy and services. However,there is security risk under all the facilities.This paper proposes an ele... As a completely new residential distribution infrastructure,energy internet facilitates transactions of equipment,energy and services. However,there is security risk under all the facilities.This paper proposes an electricity pricing model based on insurance from the perspective of maximizing the benefits of Energy Internet service providers by using the principal-agent theory. The consumer prepays the provider insurance premiums and signs a contract. The provider sets electricity price according to the premiums and therefore provides differentiated electric services for the consumer. Loss suffered by the consumer due to the power failure is compensated by the provider according to the contract. The equivalent model is presented and a necessary condition of the optimal strategy is obtained on the basis of Pontryagin's maximum principle. At last,a numerical example is presented,which illustrates the effectiveness of the proposed model. 展开更多
关键词 energy internet INSURANCE risk management optimal control fuzzy theory
在线阅读 下载PDF
User Profiling for CSDN:Keyphrase Extraction,User Tagging and User Growth Value Prediction
2
作者 Guoliang Xing Hao Gao +4 位作者 Qi Cao Xinyu Yue Bingbing Xu Keting Cen Huawei Shen 《Data Intelligence》 2019年第2期137-159,共23页
The Chinese Software Developer Network(CSDN)is one of the largest information technology communities and service platforms in China.This paper describes the user profiling for CSDN,an evaluation track of SMP Cup 2017.... The Chinese Software Developer Network(CSDN)is one of the largest information technology communities and service platforms in China.This paper describes the user profiling for CSDN,an evaluation track of SMP Cup 2017.It contains three tasks:(1)user document keyphrase extraction,(2)user tagging and(3)user growth value prediction.In the first task,we treat keyphrase extraction as a classification problem and train a Gradient-Boosting-Decision-Tree model with comprehensive features.In the second task,to deal with class imbalance and capture the interdependency between classes,we propose a two-stage framework:(1)for each class,we train a binary classifier to model each class against all of the other classes independently;(2)we feed the output of the trained classifiers into a softmax classifier,tagging each user with multiple labels.In the third task,we propose a comprehensive architecture to predict user growth value.Our contributions in this paper are summarized as follows:(1)we extract various types of features to identify the key factors in user value growth;(2)we use the semi-supervised method and the stacking technique to extend labeled data sets and increase the generality of the trained model,resulting in an impressive performance in our experiments.In the competition,we achieved the first place out of 329 teams. 展开更多
关键词 User profiling Keyphrase extraction User tagging Growth value prediction Word embedding
原文传递
A commentary of Digital contact tracing in MIT Technology Review 2021
3
作者 Xueqi Cheng 《Fundamental Research》 CAS 2021年第6期838-839,共2页
In 2020,the COVID-19 pandemic has brought“digital contact tracing”to the forefront of public attention.In the context of COVID-19,technology has offered public health investigators a new capability for locating infe... In 2020,the COVID-19 pandemic has brought“digital contact tracing”to the forefront of public attention.In the context of COVID-19,technology has offered public health investigators a new capability for locating infected individuals,i.e.,digital contact tracing.Through this technology,investigators were able to track the location of patients without relying on their memory,which alleviated disease surveillance pressure.The practical application of this technology is known as“Exposure Notification.”Developers were able to complete the creation and operation of this digital contact tracing system within a few weeks,and they made the code open-source to ensure that Apple and Android users worldwide could utilize it. 展开更多
关键词 DEVELOPER ANDROID INDIVIDUAL
原文传递
Identity-Preserving Adversarial Training for Robust Network Embedding
4
作者 岑科廷 沈华伟 +2 位作者 曹婍 徐冰冰 程学旗 《Journal of Computer Science & Technology》 SCIE EI CSCD 2024年第1期177-191,共15页
Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network e... Network embedding,as an approach to learning low-dimensional representations of nodes,has been proved extremely useful in many applications,e.g.,node classification and link prediction.Unfortunately,existing network embed-ding models are vulnerable to random or adversarial perturbations,which may degrade the performance of network em-bedding when being applied to downstream tasks.To achieve robust network embedding,researchers introduce adversari-al training to regularize the embedding learning process by training on a mixture of adversarial examples and original ex-amples.However,existing methods generate adversarial examples heuristically,failing to guarantee the imperceptibility of generated adversarial examples,and thus limit the power of adversarial training.In this paper,we propose a novel method Identity-Preserving Adversarial Training(IPAT)for network embedding,which generates imperceptible adversarial exam-ples with explicit identity-preserving regularization.We formalize such identity-preserving regularization as a multi-class classification problem where each node represents a class,and we encourage each adversarial example to be discriminated as the class of its original node.Extensive experimental results on real-world datasets demonstrate that our proposed IPAT method significantly improves the robustness of network embedding models and the generalization of the learned node representations on various downstream tasks. 展开更多
关键词 network embedding identity-preserving adversarial training adversarial the example
原文传递
A Model-Agnostic Hierarchical Framework Towards Trajectory Prediction
5
作者 Tang-Wen Qian Yuan Wang +4 位作者 Yong-Jun Xu Zhao Zhang Lin Wu Qiang Qiu Fei Wang 《Journal of Computer Science & Technology》 2025年第2期322-339,共18页
Predicting the future trajectories of multiple agents is essential for various applications in real life,such as surveillance systems,autonomous driving,and social robots.The trajectory prediction task is influenced b... Predicting the future trajectories of multiple agents is essential for various applications in real life,such as surveillance systems,autonomous driving,and social robots.The trajectory prediction task is influenced by many factors,including the individual historical trajectory,interactions between agents,and the fuzzy nature of the observed agents’motion.While existing methods have made great progress on the topic of trajectory prediction,they treat all the information uniformly,which limits the effectiveness of information utilization.To this end,in this paper,we propose and utilize a model-agnostic framework to regard all the information in a two-level hierarchical view.Particularly,the first-level view is the inter-trajectory view.In this level,we observe that the difficulty in predicting different trajectory samples varies.We define trajectory difficulty and train the proposed framework in an“easy-to-hard”schema.The second-level view is the intra-trajectory level.We find the influencing factors for a particular trajectory can be divided into two parts.The first part is global features,which keep stable within a trajectory,i.e.,the expected destination.The second part is local features,which change over time,i.e.,the current position.We believe that the two types of information should be handled in different ways.The hierarchical view is beneficial to take full advantage of the information in a fine-grained way.Experimental results validate the effectiveness of the proposed model-agnostic framework. 展开更多
关键词 spatial-temporal data mining trajectory prediction hierarchical framework model-agnostic
原文传递
Modeling the Correlations of Relations for Knowledge Graph Embedding 被引量:8
6
作者 Ji-Zhao Zhu Yan-Tao Jia +2 位作者 Jun Xu Jian-Zhong Qiao Xue-Qi Cheng 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第2期323-334,共12页
Knowledge graph embedding, which maps the entities and relations into low-dimensional vector spaces, has demonstrated its effectiveness in many tasks such as link prediction and relation extraction. Typical methods in... Knowledge graph embedding, which maps the entities and relations into low-dimensional vector spaces, has demonstrated its effectiveness in many tasks such as link prediction and relation extraction. Typical methods include TransE, TransH, and TransR. All these methods map different relations into the vector space separately and the intrinsic correlations of these relations are ignored. It is obvious that there exist some correlations among relations because different relations may connect to a common entity. For example, the triples (Steve Jobs, PlaceOfBrith, California) and (Apple Inc., Location, California) share the same entity California as their tail entity. We analyze the embedded relation matrices learned by TransE/TransH/TransR, and find that the correlations of relations do exist and they are showed as low-rank structure over the embedded relation matrix. It is natural to ask whether we can leverage these correlations to learn better embeddings for the entities and relations in a knowledge graph. In this paper, we propose to learn the embedded relation matrix by decomposing it as a product of two low-dimensional matrices, for characterizing the low-rank structure. The proposed method, called TransCoRe (Translation-Based Method via Modeling the Correlations of Relations), learns the embeddings of entities and relations with translation-based framework. Experimental results based on the benchmark datasets of WordNet and Freebase demonstrate that our method outperforms the typical baselines on link prediction and triple classification tasks. 展开更多
关键词 knowledge graph embedding low-rank matrix decomposition
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部