Advanced Materials Research
Vol. 872
Vol. 872
Advanced Materials Research
Vol. 871
Vol. 871
Advanced Materials Research
Vols. 869-870
Vols. 869-870
Advanced Materials Research
Vol. 868
Vol. 868
Advanced Materials Research
Vols. 864-867
Vols. 864-867
Advanced Materials Research
Vols. 860-863
Vols. 860-863
Advanced Materials Research
Vol. 859
Vol. 859
Advanced Materials Research
Vol. 858
Vol. 858
Advanced Materials Research
Vol. 857
Vol. 857
Advanced Materials Research
Vol. 856
Vol. 856
Advanced Materials Research
Vol. 855
Vol. 855
Advanced Materials Research
Vol. 854
Vol. 854
Advanced Materials Research
Vol. 853
Vol. 853
Advanced Materials Research Vol. 859
Paper Title Page
Abstract: This paper aims to find an effective solution to detect fraudulent clicks from commissioners’ click logs. Given user’s click information of ads, we want to predict the user’s fraudulent label – malicious or not. Based on training set, we build our classification models for fraudulent click detection. We first create and extract features for the raw log data we show above. Next, we choose models by evaluating classifiers, and then build an ensemble model. Finally, we applied our model on the real dataset for human judge reference.
586
Abstract: This paper presents a comparative study on GM model with residual modification and ARMA model. First set up a grey GM(1, 1) prediction model based on the original a series of data. In order to improve the accuracy of prediction, re-establish GM(1, 1) prediction model for residual tails and revise original GM(1, 1) prediction model with error modification. Then, use series of ARMA(p, q) models for modeling in original sequence. By comparing parameters of the candidate models, finally select MA (2) as appropriate for the prediction model. At Last, through the comparison of a variety of parameters, study their respective advantages and disadvantages of these two kinds of predictive models in the network information system survival situation.
591
Abstract: The information rate is an important metric of the performance of a secret-sharing scheme. In this paper, we deal with determining the exact values for the optimal information rates of the six graph access structures and improving the information rate of a graph access structure on seven participants, which remained as open problems in Song's and Wang's paper([1,2]). We prove that the optimal information rate for each of the six graph access structures is equal to 4/7
596
Interaction Motivation Driven Virtual Human Emotion Modeling in Computer Engineering and Application
Abstract: Affective computing had been widely used in computer engineering and applications fields. Emotion generation is an important research component in affective computing field and there were a lot of works had been put into generating lifelike emotion reaction and emotional behaviors [1-. OCC model is the most common used emotion model and can be integrated with other component to generate virtual humans emotion states. However
602
Abstract: The development of rural e-commerce is a gradual process involving various factors, among which the application of information technology for the role of government is of great importance. Rural e-commerce in China is lagging behind compared with the developed countries. As a kind of basic public service, rural e-commerce has strong positive externality. Government at different levels have to share the responsibility in terms of capital input, financial aid, tax policy and legal support.
608
Abstract: Web application technology is system which is linked with each other by many hypertext systems, through the Internet access and plays an important role in public hospital reform. Public hospital reformist carried out in the complicated political and economic environment and will be affected and restricted by internal and external factors. On the macro, the role of government, guiding theories of reform, value orientation, economic and technical factors and so on engender a significant influence on the reform; on the micro, the interest game between stakeholders of public hospital also affects the implementation of the reform of public hospitals
613