期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Novel Bidirectional LSTM and Attention Mechanism Based Neural Network for Answer Selection in Community Question Answering 被引量:4
1
作者 Bo Zhang Haowen Wang +2 位作者 Longquan Jiang Shuhan Yuan Meizi Li 《Computers, Materials & Continua》 SCIE EI 2020年第3期1273-1288,共16页
Deep learning models have been shown to have great advantages in answer selection tasks.The existing models,which employ encoder-decoder recurrent neural network(RNN),have been demonstrated to be effective.However,the... Deep learning models have been shown to have great advantages in answer selection tasks.The existing models,which employ encoder-decoder recurrent neural network(RNN),have been demonstrated to be effective.However,the traditional RNN-based models still suffer from limitations such as 1)high-dimensional data representation in natural language processing and 2)biased attentive weights for subsequent words in traditional time series models.In this study,a new answer selection model is proposed based on the Bidirectional Long Short-Term Memory(Bi-LSTM)and attention mechanism.The proposed model is able to generate the more effective question-answer pair representation.Experiments on a question answering dataset that includes information from multiple fields show the great advantages of our proposed model.Specifically,we achieve a maximum improvement of 3.8%over the classical LSTM model in terms of mean average precision. 展开更多
关键词 Question answering answer selection deep learning Bi-LSTM attention mechanisms
下载PDF
Using dummy data for RFID tag and reader authentication
2
作者 Baha’A.Alsaify Dale R.Thompson +1 位作者 Abdallah Alma'aitah Jia Di 《Digital Communications and Networks》 SCIE CSCD 2022年第5期804-813,共10页
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery ... Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.In this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system.The proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication process.Furthermore,the proposed authentication scheme is mathematically modeled and validated using extensive simulation.The simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers. 展开更多
关键词 RFID AUTHENTICATION Dummy data SECURITY DECOYS
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部