Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((ZHOU Fan[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Trajectory prediction model of social network users based on self-supervised learning
DAI Yurou, YANG Qing, ZHANG Fengli, ZHOU Fan
Journal of Computer Applications 2021, 41 (
9
): 2545-2551. DOI:
10.11772/j.issn.1001-9081.2020111859
Abstract
(
547
)
PDF
(1050KB)(
617
)
Knowledge map
Save
Aiming at the existing problems in user trajectory data modeling such as the sparsity of check-in points, long-term dependencies and complex moving patterns, a social network user trajectory prediction model based on self-supervised learning, called SeNext, was proposed to model and train the user trajectory to predict the next Point Of Interest (POI) of the user. First, data augmentation was utilized to expand the training trajectory samples, which solved the problem of the deficiency of model generalization capability caused by insufficient data and too few footprints of some users. Second, Recurrent Neural Network (RNN), Convolutional Neural Network (CNN) and attention mechanism were adopted into the modeling of current and historical trajectories respectively, so as to extract effective representations from high-dimensional sparse data to match the most similar moving patterns of users in the past. Finally, SeNext learned the implicit representations in the latent space by combining self-supervised learning and introducing contrastive loss Noise Contrastive Estimation (InfoNCE) to predict the next POI of the user. Experimental results show that compared to the state-of-the-artVariational Attention based Next (VANext)model, SeNext improves the prediction accuracy about 11% on Top@1.
Reference
|
Related Articles
|
Metrics
Select
Efficient and load balanced open shortest path first protocol in electric power communication network
LI Zhuhong, ZHAO Canming, ZHOU Fang, ZHANG Xinming
Journal of Computer Applications 2017, 37 (
7
): 1873-1876. DOI:
10.11772/j.issn.1001-9081.2017.07.1873
Abstract
(
525
)
PDF
(809KB)(
387
)
Knowledge map
Save
To solve the traffic load-imbalance problem in electric power communication networks based on Open Shortest Path First (OSPF) protocol, an efficient Two-Step Optimized OSPF Protocol (TSO-OSPF) algorithm was proposed to balance the traffic in intra-area and inter-area of OSPF respectively. The bandwidth utilization and delay were adopted as link weights, the inward and outward traffic of a router was considered, the overloaded branches were decomposed into multiple routers to minimize the maximum traffic flow, thus the traffic-imbalance problem of internal and boundary router in the electric power communication networks was solved. The simulation results show that the TSO-OSPF algorithm can effectively balance the traffic in the network and reduce the packet loss rate by about 10% compared with the OSPF algorithm.
Reference
|
Related Articles
|
Metrics
Select
Precise three-watermarking algorithm for image tamper localization and recovery
Yan ZHOU Fan-zhi ZENG Yang-ju ZHUO
Journal of Computer Applications 2011, 31 (
04
): 966-969. DOI:
10.3724/SP.J.1087.2011.00966
Abstract
(
1334
)
PDF
(643KB)(
433
)
Knowledge map
Save
Concerning the shortage of the tamper localization accuracy and tamper recovery performance in the existing image tampers localization and recovery algorithms, the authors proposed a precise three-watermarking algorithm. It generated three types of watermarks such as detection watermark, localization watermark and recovery watermark by binary coding based on Least Significant Bit (LSB). The watermarks were imbedded into the low bits of image. Tamper detection and recovery were implemented by detection watermark and recovery watermark based on blocks, and precise localization was implemented by localization watermark based on single pixel. The simulation results show that the proposed algorithm has precise tamper localization to any size of brightness images and RGB images, and has good tamper recovery performance.
Related Articles
|
Metrics
Select
Scheme of supporting trust transfer in mobile environment
ZHOU Fan,SHE Kun,WU Yue
Journal of Computer Applications 2005, 25 (
11
): 2512-2514.
Abstract
(
1279
)
PDF
(606KB)(
1157
)
Knowledge map
Save
Based on SAML2.0 standard,a scheme of supporting trust transfer of mobile equipment was presented.The architecture and the flow of this system were described. Several problems and relative countermeasures about security and deployment were analyzed and proposed.
Related Articles
|
Metrics