Research on Clothing Product Reviews Mining Based on the Maximum Entropy
Journal Title: EAI Endorsed Transactions on Energy Web - Year 2015, Vol 1, Issue 4
Abstract
this paper excavated the review theme of clothing products by method of association rules, and built a maximum entropy model for the reviews classification. Then this paper did experimental verification to large-scale clothing product reviews classification, which verified the practical effect that maximum entropy model had in the comment text classification problems. In the process of classification, the maximum entropy model had a good effect, of which accuracy was over 90%.
Authors and Affiliations
Pengfei Feng, Qinghong Yang
Energy Harvested IEEE802.15.4 Wireless Body Area Network
With the increasing demand of wireless body area network (WBAN) for patient monitoring systems, it is necessary to develop efficient energy management systems to either prolong node battery replacement time or to develop...
Low Energy Clustering in BAN Based on Fuzzy Simulated Evolutionary Computation
A low energy clustering method of body area networks based on fuzzy simulated evolutionary computation is proposed in this paper. To reduce communication energy consumption, we also designed a fuzzy controller to dynamic...
Design and Simulation of Stand-alone PV System for Electronic and Communications Engineering Department Laboratories in Al-Nahrain University
In Iraq the problem of electricity shutdown in the main supply is still exists and the cuts may last for hours. This shutdown causes problems in lectures and students experiments in the colleges because all electrical de...
Training of engineering personnel in the Sevastopol State University on the basis of the project “Synergy”
In the article, the problems of modern engineering training are discussed. The practice of Sevastopol State University in this field is represented. The participation of the university in the international project “Syner...
Application of a Hybrid Method for Key Energy Facilities Safety Assessment
Information Technologies (hereinafter – the “IT”) without security functions (hereinafter – the “SF”) are the exception rather than the rule nowadays [1 – 4]. Components of IT without SF are not a big problem since they...