Filters








72,314 Hits in 5.6 sec

Evaluating Multi-Label Classifiers and Recommender Systems in the Financial Service Sector

Matthias Bogaert, Justine Lootens, Dirk Van den Poel, Michel Ballings
2019 European Journal of Operational Research  
In previous studies, multi-label classification techniques and recommender systems were always investigated independently of each other.  ...  The objective of this paper is to evaluate multi-label classification techniques and recommender systems for cross-sell purposes in the financial services sector.  ...  An application of recommender systems related to financial services can be found in Felfernig et al. (2007a) .  ... 
doi:10.1016/j.ejor.2019.05.037 fatcat:xtfm7n7bpnh4jimxk4buwacfiy

Vapour-liquid equilibria in alkan-1-ol + n-alkane mixtures (Technical Report)

John H. Dymond
1994 Pure and Applied Chemistry  
Names of countries given after Members' names are in accordance with the ZUPAC Handbook 1991-93; changes will be effected in the 1994-95 edition.  ...  Maczynski of CODATA whose Symposia on Critical Evaluation and Prediction of Phase Equilibria in Multicomponent Systems were held jointly with our workshops; the excellent organization of all the local  ...  R holub (Liblice, 1991); and finally the support and continued interest of the sixty or so scientists who were involved in this project.  ... 
doi:10.1351/pac199466030553 fatcat:5b2twa6fxzaxlicacgsne7fsxi

Selecting a Feature Set to Summarize Texts in Brazilian Portuguese [chapter]

Daniel Saraiva Leite, Lucia Helena Machado Rino
2006 Lecture Notes in Computer Science  
the three heuristics of the method S must appear in special positions of the text (beginning or ending) Location F2 S must be recommended by at least one of the three heuristics of the methodLexical Chains  ...  of sentence within the paragraph Position of paragraph Label Approach 2: Improving Features Representation Only first heuristic recommends the sentence H1 No heuristics recommend the sentence  ... 
doi:10.1007/11874850_50 fatcat:6d7wij27hrd23kxf5w6djm4gae

Trust in large-scale computational grids

José de R. P. Braga, Alexandre C. T. Vidal, Fabio Kon, Marcelo Finger
2006 Proceedings of the 4th international workshop on Middleware for grid computing - MCG '06  
However, SPKI/SDSI certification chains are not suitable for large scale, highly dynamic environments such as computational grids.  ...  Their presence in a trust chain can result in denied access. On the other hand, normal subjects only execute correct actions and receive positive opinion.  ...  First, the opinion composition allows chains to be verified considering non-binary opinions of all related subjects.  ... 
doi:10.1145/1186675.1186683 dblp:conf/middleware/JrVKF06 fatcat:2vdjsp46obg2ni7onuudyq7lgq

Fashion Styling Recommendation with Intelligent Systems: Test of an Online Platform

Vuruskan A, Bulgun E, Ince T, Guzelis C, Demirkiran G, Oktar Y
2018 Journal of Fashion Technology & Textile Engineering  
Integration of intelligent systems in fashion and design related field is a relatively new concept.  ...  Note that, even the average result was unsatisfactory, certain participants indicated their positive remarks for the recommendations provided by intelligent fashion styling platform to identify their expectations  ...  Authors would like to thank Research Assistants Beste Bayindir and Idil Ozusta for their support in fashion drawings and website design.  ... 
doi:10.4172/2329-9568.s4-005 fatcat:7qxcynkhazb7dpqb7kpocgfpn4

Covert Channel in RTP Payload Using a Pointer in Sip Header

Miroslav Voznak, Ivo Zbranek, Miralem Mehic, Dan Komosny, Homero Toral-Cruz, Jerry Chun-Wei Lin
2016 Communications - Scientific Letters of the University of Zilina  
The transmission of the pointer series in the SIP header can be performed by means of the Re-INVITE method, nevertheless it is recommended to insert only ordinary transactions in the SIP dialogue and not  ...  The research was performed using the infrastructure of the SIX Centre. packet in which it is located is reflected in the branch value, in the Via field in the SIP header.  ...  In reality, we only have a few opportunities to send a steganogram within one SIP session due to the existence of only several transactions.  ... 
doi:10.26552/com.c.2016.1.40-47 fatcat:cr3rkcm7szfp5dlpevw3tluchi

Security analysis of an audio data encryption scheme based on key chaining and DNA encoding [article]

Imad El Hanouti, Hakim El Fadili
2019 arXiv   pre-print
The cryptosystem is based on substitution-permutation encryption structure using DNA encoding at the substitution stage, in which the key generation is based on a key chaining algorithm that generates  ...  Negatively, in this paper we show the opposite: the scheme is extremely weak against chosen ciphertext and plaintext attacks thus only two chosen plaintexts of 32 byte size are sufficient to recover the  ...  nor the cipher blocks are related to the key generation and chaining process.  ... 
arXiv:1910.11677v1 fatcat:dwnq7gk6nje4znhjopznn7dg3a

On the Various Nomenclature Systems

2012 Chemistry International  
Binary nomenclature groups constituents of compounds into two classes, positive and negative.  ...  A structure-based name for this material might be poly(1-vinylethane-1,2-diyl), but this represents only the units of the polymer chain, not the end groups, so it may be equally incomplete.  ... 
doi:10.1515/ci.2012.34.3.28 fatcat:hdsobbbvyfd3votlk26f3lsvvq

Formal Data Validation with Event-B [article]

Frédéric Badeau, Marielle Doche-Petit
2012 arXiv   pre-print
This article presents a verification and validation activity performed in an industrial context, to validate configuration data of a metro CBTC system by creating a formal B model of these configuration  ...  A double tool chain is used to safely check whether a certain given input of configuration data fulfill its properties.  ...  Interfacing predicate evaluation tools directly with binary structures is not recommended, since it would depend too much on a particular binary structure and would be difficult to maintain.  ... 
arXiv:1210.7039v1 fatcat:si3ggnl6w5dhdfrmuasbls2nnu

New Approach for Joint Multilabel Classification with Community-Aware Label Graph Learning Technique

R. V., Disha Rajan
2018 International Journal of Computer Applications  
We recommend a principled way to learn the structure of a graphical model by in view of input features and labels, composed with loss functions.  ...  Our proposed system has numerous attractive properties: it captures label dependences; it decreases the multi-label problem to numerous standard binary and multiclass problems; it subsumes the classic  ...  System proposed Classifier chains for multi-label classification itshows that binary relevance-based methods have much to proposition, specifically in positions of scalability to large datasets.  ... 
doi:10.5120/ijca2018916892 fatcat:f2tyewknqzaopdzxolyzsqahqm

Architecture and Algorithms for a Distributed Reputation System [chapter]

Michael Kinateder, Kurt Rothermel
2003 Lecture Notes in Computer Science  
In this paper we propose a system that closely reflects real-world trust building in an online environment.  ...  Trust is an essential component of successful interactions in social life as well as in business relationships.  ...  The term recommendation system in this context has a dual meaning, since it is not only the users recommending articles but also the system recommending suitable articles to its users.  ... 
doi:10.1007/3-540-44875-6_1 fatcat:dswujp4zc5abnoxdav3cqwf2le

Efficient Certification Path Discovery for MANET

Georgios Kambourakis, Elisavet Konstantinou, Anastasia Douma, Marios Anagnostopoulos, Georgios Fotiadis
2010 EURASIP Journal on Wireless Communications and Networking  
The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided  ...  Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment.  ...  Procedure add binary string add binary string(node id) # Define a binary string for each node in relation with its position # in the tree.  ... 
doi:10.1155/2010/243985 fatcat:p2tergeiwbayfgwbh6a3zzr3ce

A survey of trust management systems for online social communities – Trust modeling, trust inference and attacks

Yefeng Ruan, Arjan Durresi
2016 Knowledge-Based Systems  
Trust can help participants in online social communities to make decisions; however, it is a challenge for systems to map trust into computational models because of its subjective property.  ...  We provide a survey of existing trust management systems for online social communities. We also list four types of attacks, and analyze existing systems' vulnerabilities.  ...  In [49] , Golbeck proposed a scheme to infer binary trust in social networks. When considering recommendations, only trustworthy neighbors' recommendations are selected.  ... 
doi:10.1016/j.knosys.2016.05.042 fatcat:34ilydu4sjgjfoziqwx77ruoxu

The effect of COVID-19 on patients with chronic spontaneous urticaria treated with omalizumab and antihistamines: A cross-sectional, comparative study

Ecem Bostan, Fethi Zaid, Aysen Karaduman, Sibel Dogan, Duygu Gulseren, Basak Yalici-Armagan, Neslihan Akdogan, Sibel Ersoy-Evans, Gonca Elcin
2021 Journal of Cosmetic Dermatology  
Of 156 patients with COVID-19 RT-PCR test, RT-PCR result was positive in 15 cases.  ...  Demographical data, treatment given for CSU, the presence of COVID-19-related symptoms, history of close contact to a person with COVID-19 and COVID-19 real-time polymerase chain reaction (RT-PCR) results  ...  the present study, we aimed to determine the prevalence of COVID-19-related symptoms and COVID-19 real-time polymerase chain reaction (RT-PCR) positivity among CSU patients in relation to the age, gender  ... 
doi:10.1111/jocd.14484 pmid:34599630 pmcid:PMC8661558 fatcat:xeeoexsbonbvzh4na6k4wtkphu

Design and Postures of a Serial Robot Composed by Closed-Loop Kinematics Chains [chapter]

David Ubeda, Jose Maria, Arturo Gil, Oscar Reinoso
2012 Serial and Parallel Robot Manipulators - Kinematics, Dynamics, Control and Optimization  
Introduction The robot presented in this chapter is a new binary hybrid (parallel-serial) type climbing system composed by several closed-chains arranged in an open-chain.  ...  In our opinion, binary actuators are interesting, since they allow for an easier control of the robot: only two different positions need to be controlled.  ... 
doi:10.5772/33364 fatcat:mniux6spzrcwhn3kxy5wxa7lgq
« Previous Showing results 1 — 15 out of 72,314 results