Collective view prediction is to judge the opinions of an active web user based on unknown elements by referring to the collective mind of the whole community. Content-based recommendation and collaborative filtering are two mainstream collective view prediction techniques. They generate predictions by analyzing the text features of the target object or the similarity of users’ past behaviors. Still, these techniques are vulnerable to the artificially-injected noise data, because they are not able to judge the reliability and credibility of the information sources. Trust-based Collective View Prediction describes new approaches for tackling this problem by utilizing users’ trust relationships from the perspectives of fundamental theory, trust-based collective view prediction algorithms and real case studies. The book consists of two main parts – a theoretical foundation and an algorithmic study. The first part will review several basic concepts and methods related to collective view prediction, such as state-of-the-art recommender systems, sentimental analysis, collective view, trust management, the Relationship of Collective View and Trustworthy, and trust in collective view prediction. In the second part, the authors present their models and algorithms based on a quantitative analysis of more than 300 thousand users’ data from popular product-reviewing websites. They also introduce two new trust-based prediction algorithms, one collaborative algorithm based on the second-order Markov random walk model, and one Bayesian fitting model for combining multiple predictors. The discussed concepts, developed algorithms, empirical results, evaluation methodologies and the robust analysis framework described in Trust-based Collective View Prediction will not only provide valuable insights and findings to related research communities and peers, but also showcase the great potential to encourage industries and business partners to integrate these techniques into new applications.
Both authors have taught the course of “Distributed Systems” for many years in the respective schools. During the teaching, we feel strongly that “Distributed systems” have evolved from traditional “LAN” based distributed systems towards “Internet based” systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of “distributed systems” with orientation to the requirement of the undergraduate level study for today’s distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.
Fractional evolution equations describe various complex and nonlocal systems with memory. This volume investigates fractional evolution equations, in infinite intervals. The book covers a range of topics, including the existence, uniqueness, attractivity, and applications to fractional diffusion equations and fractional Schrodinger equations. Researchers and graduate students in pure and applied mathematics will find this a useful reference.
This book explains the theory and methods of system optimization design for railway intelligent transportation systems (RITS), which optimizes RITS total performance by decreasing the difficulty and cost of system development and increasing the system efficiency. Readers will understand key concepts of RITS and the latest research relevant to China and other countries where RITSs have been developed. The book is suitable for university scholars in the field of railway transportation.
In this dazzling, earthy novel, Pingwa presents an unforgettable chronicle of rural China, a world at once utterly alien and uncannily familiar. Called "impressive and revealing" ("Kirkus Reviews), Turbulence" follows the love lives of two peasants through the post-Mao years.
In the past four or so decades, a significant amount of research efforts has been made to examine the rapid and constant social changes in China. However, most of the literature has focused on either macro- or micro-level issues, and what has not been adequately analysed is how the majority of ordinary people has reacted to and influenced the changes. This inadequacy has affected our understanding of Chinese society, its dynamics and the changing trends. Drawing upon a new perspective of competitive social repositioning, and the evidence recorded in numerous recent publications and interview data, this book seeks to re-examine the ever-changing, but under-researched, societal dynamics driving social transformations in China from 1964, when the communist heir narrative was rebranded and utilised, to 2000, when Jiang Zemin formulated the Three-Represents theory to modify the ideological political thinking of China’s ruling elites. This analysis focuses on how a high proportion of aspirational citizens have kept repositioning themselves in China’s changing distributions of social resources and social structure, how their attitudes and behaviours have been shaped over time, what characteristics of their choices are at different stages, and how their preferences have resulted in the zig-zag patterns of China’s recent social change.
During the Tang dynasty (618–907), changes in political policies, the religious landscape, and gender relations opened the possibility for Daoist women to play an unprecedented role in religious and public life. Women, from imperial princesses to the daughters of commoner families, could be ordained as Daoist priestesses and become religious leaders, teachers, and practitioners in their own right. Some achieved remarkable accomplishments: one wrote and transmitted texts on meditation and inner cultivation; another, a physician, authored a treatise on therapeutic methods, medical theory, and longevity techniques. Priestess-poets composed major works, and talented priestess-artists produced stunning calligraphy. In Gender, Power, and Talent, Jinhua Jia draws on a wealth of previously untapped sources to explain how Daoist priestesses distinguished themselves as a distinct gendered religious and social group. She describes the life journey of priestesses from palace women to abbesses and ordinary practitioners, touching on their varied reasons for entering the Daoist orders, the role of social and religious institutions, forms of spiritual experience, and the relationships between gendered identities and cultural representations. Jia takes the reader inside convents and cloisters, demonstrating how they functioned both as a female space for self-determination and as a public platform for both religious and social spheres. The first comprehensive study of the lives and roles of Daoist priestesses in Tang China, Gender, Power, and Talent restores women to the landscape of Chinese religion and literature and proposes new methodologies for the growing field of gender and religion.
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.