• A Complex Network Approach for Collaborative Recommendation
Collaborative filtering (CF) is the most widely used and successful approach for personalized service recommendations. Among the collaborative recommendation approaches, neighborhood based approaches enjoy a huge amount of popularity, due to their simplicity, justifiability, efficiency and stability. Neighborhood based collaborative filtering approach finds K nearest neighbors to an active user or K most similar rated items to the target item for recommendation. Traditional similarity measures use ratings of co-rated items to find similarity between a pair of users. Therefore, traditional similarity measures cannot compute effective neighbors in sparse dataset. In this paper, we propose a two-phase approach, which generates user-user and item-item networks using traditional similarity measures in the first phase. In the second phase, two hybrid approaches HB1, HB2, which utilize structural similarity of both the network for finding K nearest neighbors and K most similar items to a target items are introduced. To show effectiveness of the measures, we compared performances of neighborhood based CFs using state-of-the-art similarity measures with our proposed structural similarity measures based CFs. Recommendation results on a set of real data show that proposed measures based CFs outperform existing measures based CFs in various evaluation metrics.
• Autonomous Perceptron Neural Network Inspired from Quantum computing
Recently with the rapid development of technology, there are a lot of applications require to achieve low-cost learning in order to accomplish inexpensive computation. However the known computational power of classical artificial neural networks (CANN), they are not capable to provide low-cost learning due to many reasons such as linearity, complexity of architecture, etc. In contrast, quantum neural networks (QNN) may be representing a good computational alternate to CANN, based on the computational power of quantum bit (qubit) over the classical bit. In this paper, a new algorithm of quantum perceptron neural network based only on one neuron is introduced to overcome some limitations of the classical perceptron neural networks. The proposed algorithm is capable to construct its own set of activation operators that enough to accomplish the learning process in a limited number of iterations and, consequently, reduces the cost of computation. For evaluation purpose, we utilize the proposed algorithm to solve five problems using real and artificial data. It is shown throughout the paper that promising results are provided and compared favorably with other reported algorithms
• Bayesian modeling of networks in complex business intelligence problems
Complex network data problems are increasingly common in many fields of application. Our motivation is drawn from strategic marketing studies monitoring customer preferences for specific products, along with co-subscription networks encoding multi-buying behavior. Data are available for multiple agencies within the same insurance company, and our goal is to efficiently exploit co-subscription networks to inform targeted advertising of cross-selling campaigns to currently mono-product customers. We address this goal by developing a Bayesian hierarchical model, which groups agencies according to common customer preferences and co-subscription networks. Within each cluster, we efficiently model customer behaviors via a cluster-dependent mixture of latent eigenmodels. This formulation allows efficient targeting, while providing key information on mono- and multi-product buying behaviors within clusters, informing cross-selling marketing campaigns. We develop simple algorithms for tractable inference, and assess the performance in simulations and an application to business intelligence.
• Distributed Multitask Learning
We consider the problem of distributed multi-task learning, where each machine learns a separate, but related, task. Specifically, each machine learns a linear predictor in high-dimensional space,where all tasks share the same small support. We present a communication-efficient estimator based on the debiased lasso and show that it is comparable with the optimal centralized method.
• Minimax Binary Classifier Aggregation with General Losses
We develop a worst-case analysis of aggregation of binary classifier ensembles in a transductive setting, for a broad class of losses including but not limited to all convex surrogates. The result is a family of parameter-free ensemble aggregation algorithms, which are as efficient as linear learning and prediction for convex risk minimization but work without any relaxations whatsoever on many nonconvex losses like the 0-1 loss. The prediction algorithms take a familiar form, applying ‘link functions’ to a generalized notion of ensemble margin, but without the assumptions typically made in margin-based learning – all this structure follows from a minimax interpretation of loss minimization.
• Model Selection and Multiple Testing – A Bayesian and Empirical Bayes Overview and some New Results
We provide a brief overview of both Bayes and classical model selection. We argue tentatively that model selection has at least two major goals, that of finding the correct model or predicting well, and that in general both these goals may not be achieved in an optimum manner by a single model selection rule. We discuss, briefly but critically, through a study of well-known model selection rules like AIC, BIC, DIC and Lasso, how these different goals are pursued in each paradigm. We introduce some new definitions of consistency, results and conjectures about consistency in high dimensional model selection problems. Finally we discuss some new or recent results in Full Bayes and Empirical Bayes multiple testing, and cross-validation. We show that when the number of parameters tends to infinity at a smaller rate than sample size, then it is best from the point of view of consistency to use most of the data for inference and only a negligible proportion to make an improper prior proper.
• On Estimation of Parameter Uncertainty in Model-Based Clustering
Mixture models are a popular tool in model-based clustering. Such a model is often fitted by a procedure that maximizes the likelihood, such as the EM algorithm. At convergence, the maximum likelihood parameter estimates are typically reported, but in most cases little emphasis is placed on the variability associated with these estimates. In part this may be due to the fact that standard errors are not directly calculated in the model-fitting algorithm, either because they are not required to fit the model, or because they are difficult to compute. The examination of standard errors in model-based clustering is therefore typically neglected. The widely used R package mclust has recently introduced bootstrap and weighted likelihood bootstrap methods to facilitate standard error estimation. This paper provides an empirical comparison of these methods (along with the jackknife method) for producing standard errors and confidence intervals for mixture parameters. These methods are illustrated and contrasted in both a simulation study and in the traditional Old Faithful data set.
• A Bayesian approach to constrained single- and multi-objective optimization
• A boundary driven generalised contact process with exchange of particles: Hydrodynamics in infinite volume
• A Note on Easy and Efficient Computation of Full Abelian Periods of a Word
• A recurrence for an expression involving double factorials
• A Selective Approach to Internal Inference
• A Tutte polynomial inequality for lattice path matroids
• A zero-free interval for chromatic polynomials of graphs with 3-leaf spanning trees
• An Asynchronous Implementation of the Limited Memory CMA-ES
• Approaches to asymptotics for U-statistics of Gibbs facet processes
• Automatic Taxonomy Extraction from Query Logs with no Additional Sources of Information
• Bicovariograms and Euler characteristic I. Regular sets
• Bicovariograms and Euler characteristic II. Random fields excursions
• Bishellable drawings of $K_n$
• Construction of Directed Assortative Configuration Graphs
• Convergence of the consistent maximal displacement of the branching random walk
• Correlations between real conjugate algebraic numbers
• Excluding A Grid Minor In Planar Digraphs
• Exposing the Probabilistic Causal Structure of Discrimination
• Implementing Efficient All Solutions SAT Solvers
• Kronecker coefficients and noncommutative super Schur functions
• Lattice Approximations of Reflected Stochastic Partial Differential Equations Driven by Space-Time White Noise
• Lévy processes with values in locally convex Suslin spaces
• Microwave Surveillance based on Ghost Imaging and Distributed Antennas
• Minimax Lower Bounds for Noisy Matrix Completion Under Sparse Factor Models
• Multi-armed Bandits with Application to 5G Small Cells
• Noncommutative Schur functions, switchboards, and positivity
• Nonlinear State Space Model Identification Using a Regularized Basis Function Expansion
• On independent set on B1-EPG graphs
• Online Vision- and Action-Based Object Classification Using Both Symbolic and Subsymbolic Knowledge Representations
• Optimal strong approximation for quadratic forms
• Partition function zeros for the Ising model on complete graphs and on annealed scale-free networks
• Permutation Polynomials of $\Bbb F_{q^2}$ of the form $a{\tt X}+{\tt X}^{r(q-1)+1}$
• Quantum state transfer in a disordered one-dimensional lattice
• Regularity and Planarity of Token Graphs
• Response to Liu, Xu, and Liang (2015) and Ferrer-i-Cancho and Gómez-Rodríguez (2015) on Dependency Length Minimization
• Simple polytopes without small separators
• Smith Normal Form of Matrices Associated with Differential Posets
• Some properties of energy measures on Sierpinski gasket type fractals
• Symmetric group characters as symmetric functions
• The $\mathcal{G}$-invariant and catenary data of a matroid
• The chromatic spectrum of signed graphs
• The topology of the directed clique complex as a network invariant
• The zero-inflated promotion cure rate regression model applied to fraud propensity in bank loan applications
• Time inhomogeneity in longest gap and longest run problems
• Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps
• Why the Kemeny Time is a Constant
Like this:
Like Loading...