期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A Length-Adaptive Non-Dominated Sorting Genetic Algorithm for Bi-Objective High-Dimensional Feature Selection
1
作者 Yanlu Gong Junhai Zhou +2 位作者 Quanwang Wu MengChu Zhou junhao wen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第9期1834-1844,共11页
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected featu... As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected features.Evolutionary computing(EC)is promising for FS owing to its powerful search capability.However,in traditional EC-based methods,feature subsets are represented via a length-fixed individual encoding.It is ineffective for high-dimensional data,because it results in a huge search space and prohibitive training time.This work proposes a length-adaptive non-dominated sorting genetic algorithm(LA-NSGA)with a length-variable individual encoding and a length-adaptive evolution mechanism for bi-objective highdimensional FS.In LA-NSGA,an initialization method based on correlation and redundancy is devised to initialize individuals of diverse lengths,and a Pareto dominance-based length change operator is introduced to guide individuals to explore in promising search space adaptively.Moreover,a dominance-based local search method is employed for further improvement.The experimental results based on 12 high-dimensional gene datasets show that the Pareto front of feature subsets produced by LA-NSGA is superior to those of existing algorithms. 展开更多
关键词 Bi-objective optimization feature selection(FS) genetic algorithm high-dimensional data length-adaptive
下载PDF
Practice and Study of Training Model for Professional Master Degree in Software Engineering
2
作者 Yi Zhang Xinyi Yang +2 位作者 Jun Liao junhao wen Qingyu Xiong 《计算机教育》 2018年第12期7-12,共6页
The culture of professional degree graduate students is a new form of postgraduate education in China. It focuses on cultivating high-level and applied talents compared with original academic degree graduate students.... The culture of professional degree graduate students is a new form of postgraduate education in China. It focuses on cultivating high-level and applied talents compared with original academic degree graduate students. Considering about the source of full-time professional degree graduate students in domain of software engineering and the current college educational system, this paper makes a few beneficial explorations about curriculum, practice teaching, process management and puts forward the mode and method to improve full-time professional degree graduate education in domain of Software Engineering. 展开更多
关键词 PROFESSIONAL DEGREE GRADUATE STUDENTS training mode software talents quality ASSURANCE
下载PDF
Monte Carlo Simulation-Based Robust Workflow Scheduling for Spot Instances in Cloud Environments
3
作者 Quanwang Wu Jianzhao Fang +2 位作者 Jie Zeng junhao wen Fengji Luo 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第1期112-126,共15页
When deploying workflows in cloud environments,the use of Spot Instances(SIs)is intriguing as they are much cheaper than on-demand ones.However,Sls are volatile and may be revoked at any time,which results in a more c... When deploying workflows in cloud environments,the use of Spot Instances(SIs)is intriguing as they are much cheaper than on-demand ones.However,Sls are volatile and may be revoked at any time,which results in a more challenging scheduling problem involving execution interruption and hence hinders the successful handling of conventional cloud workflow scheduling techniques.Although some scheduling methods for Sls have been proposed,most of them are no more applicable to the latest Sls,as they have evolved by eliminating bidding and simplifying the pricing model.This study focuses on how to minimize the execution cost with a deadline constraint when deploying a workflow on volatile Sls in cloud environments.Based on Monte Carlo simulation and list scheduling,a stochastic scheduling method called MCLS is devised to optimize a utility function introduced for this problem.With the Monte Carlo simulation framework,MCLS employs sampled task execution time to build solutions via deadline distribution and list scheduling,and then returns the most robust solution from all the candidates with a specific evaluation mechanism and selection criteria.Experimental results show that the performance of MCLS is more competitive comparedwithtraditionalalgorithms. 展开更多
关键词 constrained optimization Monte Carlo simulation ROBUSTNESS Spot Instances(Sls) workflow scheduling
原文传递
From similarity perspective: a robust collaborative filtering approach for service recommendations 被引量:2
4
作者 Min GAO Bin LING +3 位作者 Linda YANG junhao wen Qingyu XIONG Shun LI 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第2期231-246,共16页
Collaborative filtering (CF) is a technique commonly used for personalized recommendation and Web service quality-of-service (QoS) prediction. However, CF is vulnerable to shilling attackers who inject fake user profi... Collaborative filtering (CF) is a technique commonly used for personalized recommendation and Web service quality-of-service (QoS) prediction. However, CF is vulnerable to shilling attackers who inject fake user profiles into the system. In this paper, we first present the shilling attack problem on CF-based QoS recommender systems for Web services. Then, a robust CF recommendation approach is proposed from a user similarity perspective to enhance the resistance of the recommender systems to the shilling attack. In the approach, the generally used similarity measures are analyzed, and the DegSim (the degree of similarities with top k neighbors) with those measures is selected for grouping and weighting the users. Then, the weights are used to calculate the service similarities/differences and predictions. We analyzed and evaluated our algorithms using WS-DREAM and Movielens datasets. The experimental results demonstrate that shilling attacks influence the prediction of QoS values, and our proposed features and algorithms achieve a higher degree of robustness against shilling attacks than the typical CF algorithms. 展开更多
关键词 COLLABORATIVE FILTERING service RECOMMENDATION system ROBUSTNESS shilling ATTACK
原文传递
Effort-aware cross-project just-in-time defect prediction framework for mobile apps
5
作者 Tian CHENG Kunsong ZHAO +2 位作者 Song SUN Muhammad MATEEN junhao wen 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第6期15-29,共15页
As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new requirements.Just-in-... As the boom of mobile devices,Android mobile apps play an irreplaceable roles in people’s daily life,which have the characteristics of frequent updates involving in many code commits to meet new requirements.Just-in-Time(JIT)defect prediction aims to identify whether the commit instances will bring defects into the new release of apps and provides immediate feedback to developers,which is more suitable to mobile apps.As the within-app defect prediction needs sufficient historical data to label the commit instances,which is inadequate in practice,one alternative method is to use the cross-project model.In this work,we propose a novel method,called KAL,for cross-project JIT defect prediction task in the context of Android mobile apps.More specifically,KAL first transforms the commit instances into a high-dimensional feature space using kernel-based principal component analysis technique to obtain the representative features.Then,the adversarial learning technique is used to extract the common feature embedding for the model building.We conduct experiments on 14 Android mobile apps and employ four effort-aware indicators for performance evaluation.The results on 182 cross-project pairs demonstrate that our proposed KAL method obtains better performance than 20 comparative methods. 展开更多
关键词 kernel-based principal component analysis adversarial learning just-in-time defect prediction cross-project model
原文传递
Mask guided diverse face image synthesis
6
作者 Song SUN Bo ZHAO +2 位作者 Muhammad MATEEN Xin CHEN junhao wen 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期67-75,共9页
Recent studies have shown remarkable success in face image generation task.However,existing approaches have limited diversity,quality and controllability in generating results.To address these issues,we propose a nove... Recent studies have shown remarkable success in face image generation task.However,existing approaches have limited diversity,quality and controllability in generating results.To address these issues,we propose a novel end-to-end learning framework to generate diverse,realistic and controllable face images guided by face masks.The face mask provides a good geometric constraint for a face by specifying the size and location of different components of the face,such as eyes,nose and mouse.The framework consists of four components:style encoder,style decoder,generator and discriminator.The style encoder generates a style code which represents the style of the result face;the generator translate the input face mask into a real face based on the style code;the style decoder learns to reconstruct the style code from the generated face image;and the discriminator classifies an input face image as real or fake.With the style code,the proposed model can generate different face images matching the input face mask,and by manipulating the face mask,we can finely control the generated face image.We empirically demonstrate the effectiveness of our approach on mask guided face image synthesis task. 展开更多
关键词 face image generation image translation generative adversarial networks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部