ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Publication Date: 2018
    Description: With the explosive growth of product reviews, review rating prediction has become an important research topic which has a wide range of applications. The existing review rating prediction methods use a unified model to perform rating prediction on reviews published by different users, ignoring the differences of users within these reviews. Constructing a separate personalized model for each user to capture the user’s personalized sentiment expression is an effective attempt to improve the performance of the review rating prediction. The user-personalized sentiment information can be obtained not only by the review text but also by the user-item rating matrix. Therefore, we propose a user-personalized review rating prediction method by integrating the review text and user-item rating matrix information. In our approach, each user has a personalized review rating prediction model, which is decomposed into two components, one part is based on review text and the other is based on user-item rating matrix. Through extensive experiments on Yelp and Douban datasets, we validate that our methods can significantly outperform the state-of-the-art methods.
    Electronic ISSN: 2078-2489
    Topics: Computer Science
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2019
    Description: Effective state estimation is critical to the security operation of power systems. With the rapid expansion of interconnected power grids, there are limitations of conventional centralized state estimation methods in terms of heavy and unbalanced communication and computation burdens for the control center. To address these limitations, this paper presents a multi-area state estimation model and afterwards proposes a consensus theory based distributed state estimation solution method. Firstly, considering the nonlinearity of state estimation, the original power system is divided into several non-overlapped subsystems. Correspondingly, the Lagrange multiplier method is adopted to decouple the state estimation equations into a multi-area state estimation model. Secondly, a fully distributed state estimation method based on the consensus algorithm is designed to solve the proposed model. The solution method does not need a centralized coordination system operator, but only requires a simple communication network for exchanging the limited data of boundary state variables and consensus variables among adjacent regions, thus it is quite flexible in terms of communication and computation for state estimation. In the end, the proposed method is tested by the IEEE 14-bus system and the IEEE 118-bus system, and the simulation results verify that the proposed multi-area state estimation model and the distributed solution method are effective for the state estimation of multi-area interconnected power systems.
    Electronic ISSN: 1996-1073
    Topics: Energy, Environment Protection, Nuclear Power Engineering
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2019
    Description: To comprehensively assess the climate risk originating from climate change, this study aims at developing a novel climate adaptation algorithm, representing not only on the basis of Climate Change Adaptation Six Steps (CCA6Steps), but also innovations in climate risk template. The climate risk template is proposed as a climate risk analysis tool based on the procedure of CCA6Steps, including the identification of problems and objectives, the analysis of current and future risks, and the assessment of adaptation options, to identify the relationship between the climate risk components, including hazard, exposure, and vulnerability. An application is implemented to demonstrate the advantages of the proposed algorithm in this study. The results show that the problems and objectives which concern the governance level and stakeholders can be clearly identified by the proposed algorithm. The relationship between climate-related hazards, exposure, and vulnerability of the protected target can also be precisely investigated. Furthermore, the climate adaptation strategies able to mitigate the impact of hazards on the protected target are further discussed in this study. In summary, the proposed climate adaptation algorithm is expected to provide a standard operating procedure and be a useful tool to support climate risk assessment.
    Electronic ISSN: 2073-4441
    Topics: Energy, Environment Protection, Nuclear Power Engineering
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2019
    Description: With the emergence of the Advanced Persistent Threat (APT) attacks, many Internet of Things (IoT) systems have faced large numbers of potential threats with the characteristics of concealment, permeability, and pertinence. However, existing methods and technologies cannot provide comprehensive and prompt recognition of latent APT attack activities in the IoT systems. To address this problem, we propose an APT Alerts and Logs Correlation Method, named APTALCM and a framework of deploying APTALCM on the IoT system, where an edge computing architecture was used to achieve cyber situation comprehension without too much data transmission cost. Specifically, we firstly present a cyber situation ontology for modeling the concepts and properties to formalize APT attack activities in the IoT systems. Then, we introduce a cyber situation instance similarity measurement method based on the SimRank mechanism for APT alerts and logs Correlation. Combining with instance similarity, we further propose an APT alert instances correlation method to reconstruct APT attack scenarios and an APT log instances correlation method to detect log instance communities. Through the coalescence of these methods, APTALCM can accomplish the cyber situation comprehension effectively by recognizing the APT attack intentions in the IoT systems. The exhaustive experimental results demonstrate that the two kernel modules, i.e., Alert Instance Correlation Module (AICM) and Log Instance Correlation Module (LICM) in our APTALCM, can achieve both high true-positive rate and low false-positive rate.
    Electronic ISSN: 1424-8220
    Topics: Chemistry and Pharmacology , Electrical Engineering, Measurement and Control Technology
    Published by MDPI
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...