期刊文献+
共找到43篇文章
< 1 2 3 >
每页显示 20 50 100
A Degradation Type Adaptive and Deep CNN-Based Image Classification Model for Degraded Images
1
作者 Huanhua Liu Wei Wang +3 位作者 Hanyu Liu Shuheng Yi Yonghao Yu Xunwen Yao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期459-472,共14页
Deep Convolutional Neural Networks(CNNs)have achieved high accuracy in image classification tasks,however,most existing models are trained on high-quality images that are not subject to image degradation.In practice,i... Deep Convolutional Neural Networks(CNNs)have achieved high accuracy in image classification tasks,however,most existing models are trained on high-quality images that are not subject to image degradation.In practice,images are often affected by various types of degradation which can significantly impact the performance of CNNs.In this work,we investigate the influence of image degradation on three typical image classification CNNs and propose a Degradation Type Adaptive Image Classification Model(DTA-ICM)to improve the existing CNNs’classification accuracy on degraded images.The proposed DTA-ICM comprises two key components:a Degradation Type Predictor(DTP)and a Degradation Type Specified Image Classifier(DTS-IC)set,which is trained on existing CNNs for specified types of degradation.The DTP predicts the degradation type of a test image,and the corresponding DTS-IC is then selected to classify the image.We evaluate the performance of both the proposed DTP and the DTA-ICMon the Caltech 101 database.The experimental results demonstrate that the proposed DTP achieves an average accuracy of 99.70%.Moreover,the proposed DTA-ICM,based on AlexNet,VGG19,and ResNet152,exhibits an average accuracy improvement of 20.63%,18.22%,and 12.9%,respectively,compared with the original CNNs in classifying degraded images.It suggests that the proposed DTA-ICM can effectively improve the classification performance of existing CNNs on degraded images,which has important practical implications. 展开更多
关键词 Image recognition image degradation machine learning deep convolutional neural network
下载PDF
Improving Prediction of Chronic Kidney Disease Using KNN Imputed SMOTE Features and TrioNet Model
2
作者 Nazik Alturki Abdulaziz Altamimi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Shtwai Alsubai Marwan Omar Imran Ashraf 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3513-3534,共22页
Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate diagnosis.Machine learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ... Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate diagnosis.Machine learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ML classifier algorithms to identify CKD early.This study explores the application of advanced machine learning techniques on a CKD dataset obtained from the University of California,UC Irvine Machine Learning repository.The research introduces TrioNet,an ensemble model combining extreme gradient boosting,random forest,and extra tree classifier,which excels in providing highly accurate predictions for CKD.Furthermore,K nearest neighbor(KNN)imputer is utilized to deal withmissing values while synthetic minority oversampling(SMOTE)is used for class-imbalance problems.To ascertain the efficacy of the proposed model,a comprehensive comparative analysis is conducted with various machine learning models.The proposed TrioNet using KNN imputer and SMOTE outperformed other models with 98.97%accuracy for detectingCKD.This in-depth analysis demonstrates the model’s capabilities and underscores its potential as a valuable tool in the diagnosis of CKD. 展开更多
关键词 Precisionmedicine chronic kidney disease detection SMOTE missing values healthcare KNNimputer ensemble learning
下载PDF
Secure and Reliable Routing in the Internet of Vehicles Network:AODV-RL with BHA Attack Defense
3
作者 Nadeem Ahmed Khalid Mohammadani +3 位作者 Ali Kashif Bashir Marwan Omar Angel Jones Fayaz Hassan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期633-659,共27页
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h... Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether.Recognizing the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against BHA.An additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network behaviors.Rigorous testing of our solution has revealed its remarkable ability to enhance communication in VANETs.Specifically,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and security.These results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency. 展开更多
关键词 Black hole attack IoV vehicular ad hoc network AODV routing protocol
下载PDF
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection 被引量:63
4
作者 Xiaorui Zhang Xun Sun +2 位作者 Xingming Sun Wei Sun Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2022年第5期3035-3050,共16页
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori... The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility. 展开更多
关键词 TELEMEDICINE privacy protection audio watermarking robust reversible watermarking two-stage embedding
下载PDF
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19 被引量:4
5
作者 Xiaorui Zhang Wenfang Zhang +2 位作者 Wei Sun Tong Xu Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2020年第9期1435-1452,共18页
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in rem... In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry.To ensure the integrity and security of medical images,this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest(ROI)and integer wavelet transform(IWT).First,the medical image is divided into two different parts,regions of interest and non-interest regions.Then the integrity of ROI is verified using the hash algorithm,and the recovery data of the ROI region is calculated at the same time.Also,binary images with the basic information of patients are processed by logistic chaotic map encryption,and then the synthetic watermark is embedded in the medical carrier image using IWT transform.The performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the lungs.Experimental results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image reliability.The maximum peak signal to noise ratio(PSNR)value of 51.24 has been achieved,which proves that the watermark is invisible and has strong robustness against noise,compression,and filtering attacks. 展开更多
关键词 Digital watermarking LOGISTIC hash algorithm ROI IWT
下载PDF
A Real-time Cutting Model Based on Finite Element and Order Reduction 被引量:3
6
作者 Xiaorui Zhang Wenzheng Zhang +3 位作者 Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期1-15,共15页
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in real-time.Therefore,this paper proposes a rea... Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in real-time.Therefore,this paper proposes a realtime cutting model based on finite element and order reduction method,which improves the computational speed and ensure the real-time performance.The proposed model uses the finite element model to construct a deformation model of the virtual lung.Meanwhile,a model order reduction method combining proper orthogonal decomposition and Galerkin projection is employed to reduce the amount of deformation computation.In addition,the cutting path is formed according to the collision intersection position of the surgical instrument and the lesion area of the virtual lung.Then,the Bezier curve is adopted to draw the incision outline after the virtual lung has been cut.Finally,the simulation system is set up on the PHANTOM OMNI force haptic feedback device to realize the cutting simulation of the virtual lung.Experimental results show that the proposed model can enhance the real-time performance of telemedicine,reduce the complexity of the cutting simulation and make the incision smoother and more natural. 展开更多
关键词 Virtual surgery cutting model finite element model model order reduction Bezier curve
下载PDF
An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic 被引量:1
7
作者 Peipeng Yu Zhihua Xia +1 位作者 Jianwei Fei Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2020年第10期743-760,共18页
Coronaviruses are a well-known family of viruses that can infect humans or animals.Recently,the new coronavirus(COVID-19)has spread worldwide.All countries in the world are working hard to control the coronavirus dise... Coronaviruses are a well-known family of viruses that can infect humans or animals.Recently,the new coronavirus(COVID-19)has spread worldwide.All countries in the world are working hard to control the coronavirus disease.However,many countries are faced with a lack of medical equipment and an insufficient number of medical personnel because of the limitations of the medical system,which leads to the mass spread of diseases.As a powerful tool,artificial intelligence(AI)has been successfully applied to solve various complex problems ranging from big data analysis to computer vision.In the process of epidemic control,many algorithms are proposed to solve problems in various fields of medical treatment,which is able to reduce the workload of the medical system.Due to excellent learning ability,AI has played an important role in drug development,epidemic forecast,and clinical diagnosis.This research provides a comprehensive overview of relevant research on AI during the outbreak and helps to develop new and more powerful methods to deal with the current pandemic. 展开更多
关键词 Artificial intelligence COVID-19 medical applications clinical diagnosis
下载PDF
A Rule Based System for Speech Language Context Understanding
8
作者 Imran Sarwar Bajwa Muhammad Abbas Choudhary 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期39-42,共4页
Speech or Natural language contents are major tools of communication. This research paper presents a natural language processing based automated system for understanding speech language text. A new rule based model ha... Speech or Natural language contents are major tools of communication. This research paper presents a natural language processing based automated system for understanding speech language text. A new rule based model has been presented for analyzing the natural languages and extracting the relative meanings from the given text. User writes the natural language text in simple English in a few paragraphs and the designed system has a sound ability of analyzing the given script by the user. After composite analysis and extraction of associated information, the designed system gives particular meanings to an assortment of speech language text on the basis of its context. The designed system uses standard speech language rules that are clearly defined for all speech languages as English, Urdu, Chinese, Arabic, French, etc. The designed system provides a quick and reliable way to comprehend speech language context and generate respective meanings. 展开更多
关键词 语言 理解能力 汉语 英语 信息技术
下载PDF
Real-Time Recognition and Location of Indoor Objects
9
作者 Jinxing Niu Qingsheng Hu +2 位作者 Yi Niu Tao Zhang Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2021年第8期2221-2229,共9页
Object recognition and location has always been one of the research hotspots in machine vision.It is of great value and significance to the development and application of current service robots,industrial automation,u... Object recognition and location has always been one of the research hotspots in machine vision.It is of great value and significance to the development and application of current service robots,industrial automation,unmanned driving and other fields.In order to realize the real-time recognition and location of indoor scene objects,this article proposes an improved YOLOv3 neural network model,which combines densely connected networks and residual networks to construct a new YOLOv3 backbone network,which is applied to the detection and recognition of objects in indoor scenes.In this article,RealSense D415 RGB-D camera is used to obtain the RGB map and depth map,the actual distance value is calculated after each pixel in the scene image is mapped to the real scene.Experiment results proved that the detection and recognition accuracy and real-time performance by the new network are obviously improved compared with the previous YOLOV3 neural network model in the same scene.More objects can be detected after the improvement of network which cannot be detected with the YOLOv3 network before the improvement.The running time of objects detection and recognition is reduced to less than half of the original.This improved network has a certain reference value for practical engineering application. 展开更多
关键词 Object recognition improved YOLOv3 network RGB-D camera object location
下载PDF
The Water Problem and Its Solution in Gansu, China
10
作者 Yuke Li Luyi Wang Hai Cheng 《Applied Mathematics》 2017年第10期1515-1528,共14页
Based on such severe situation, we need to work out a way that enables us to analyze the current and future ability of a region to provide clean water to meet the needs of its population, and to develop a reasonable s... Based on such severe situation, we need to work out a way that enables us to analyze the current and future ability of a region to provide clean water to meet the needs of its population, and to develop a reasonable strategy to optimize the utilization of water resources in this area. This paper has worked out a resolution model and input the data of China, the United States, Russia, Laos and Afghanistan to do national testing. Then, we use the policy from “diaper incident” to do policy testing. The calculation results of the model are in conformity with the reality. Therefore, the model is effective. At last this model is used to resolve Gansu’s water problem and provide effective advices for the local government. 展开更多
关键词 WATER SCARCITY WATER Supply EFFECT China RESOURCES PROBLEMS
下载PDF
Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique
11
作者 Koushik Pal Goutam Ghosh Mahua Bhattacharya 《Journal of Intelligent Learning Systems and Applications》 2012年第3期199-206,共8页
The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this pape... The current paper presents a new digital watermarking method through bit replacement technology, which stores mul-tiple copies of the same data that is to be hidden in a scrambled form in the cover image. In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information. A new type of non-oblivious detection method is also proposed. The improvement in performance is supported through experimental results which show much enhancement in the visual and statistical invisibility of hidden data. 展开更多
关键词 Additive Noise Salt and PEPPER Noise Compression Filtering AVERAGING Multiple Watermarking MAJORITY ALGORITHM
下载PDF
Effect of Temperature &Supply Voltage Variation on Stability of 9T SRAM Cell at 45 nm Technology for Various Process Corners
12
作者 Manisha Pattanaik Shilpi Birla Rakesh Kumar Singh 《Circuits and Systems》 2012年第2期200-204,共5页
Due to the continuous rising demand of handheld devices like iPods, mobile, tablets;specific applications like biomedical applications like pacemakers, hearing aid machines and space applications which require stable ... Due to the continuous rising demand of handheld devices like iPods, mobile, tablets;specific applications like biomedical applications like pacemakers, hearing aid machines and space applications which require stable digital systems with low power consumptions are required. As a main part in digital system the SRAM (Static Random Access Memory) should have low power consumption and stability. As we are continuously moving towards scaling for the last two decades the effect of this is process variations which have severe effect on stability, performance. Reducing the supply voltage to sub-threshold region, which helps in reducing the power consumption to an extent but side by side it raises the issue of the stability of the memory. Static Noise Margin of SRAM cell enforces great challenges to the sub threshold SRAM design. In this paper we have analyzed the cell stability of 9T SRAM Cell at various processes. The cell stability is checked at deep submicron (DSM) technology. In this paper we have analyzed the effect of temperature and supply voltage (Vdd) on the stability parameters of SRAM which is Static Noise Margin (SNM), Write Margin (WM) and Read Current. The effect has been observed at various process corners at 45 nm technology. The temperature has a significant effect on stability along with the Vdd. The Cell has been working efficiently at all process corners and has 50% more SNM from conventional 6T SRAM and 30% more WM from conventional 6T SRAM cell. 展开更多
关键词 DSM TECHNOLOGY PROCESS CORNERS WRITE MARGIN READ Current Static Noise MARGIN
下载PDF
Graph Convolutional Network-Based Repository Recommendation System
13
作者 Zhifang Liao Shuyuan Cao +3 位作者 Bin Li Shengzong Liu Yan Zhang Song Yu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期175-196,共22页
GitHub repository recommendation is a research hotspot in the field of open-source software. The current problemswith the repository recommendation systemare the insufficient utilization of open-source community infor... GitHub repository recommendation is a research hotspot in the field of open-source software. The current problemswith the repository recommendation systemare the insufficient utilization of open-source community informationand the fact that the scoring metrics used to calculate the matching degree between developers and repositoriesare developed manually and rely too much on human experience, leading to poor recommendation results. Toaddress these problems, we design a questionnaire to investigate which repository information developers focus onand propose a graph convolutional network-based repository recommendation system (GCNRec). First, to solveinsufficient information utilization in open-source communities, we construct a Developer-Repository networkusing four types of behavioral data that best reflect developers’ programming preferences and extract features ofdevelopers and repositories from the repository content that developers focus on. Then, we design a repositoryrecommendation model based on a multi-layer graph convolutional network to avoid the manual formulation ofscoringmetrics. Thismodel takes the Developer-Repository network, developer features and repository features asinputs, and recommends the top-k repositories that developers are most likely to be interested in by learning theirpreferences. We have verified the proposed GCNRec on the dataset, and by comparing it with other open-sourcerepository recommendation methods, GCNRec achieves higher precision and hit rate. 展开更多
关键词 Repository recommendation graph convolutional network open-source software GitHub
下载PDF
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection 被引量:70
14
作者 Xiaorui Zhang Wenfang Zhang +2 位作者 Wei Sun Xingming Sun Sunil Kumar Jha 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期1043-1056,共14页
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the disease.In order to ensure the safe transmissio... In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the disease.In order to ensure the safe transmission and storage of medical data,a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper.The proposed algorithm employs the principal component analysis(PCA)transform to reduce the data dimension,which can minimize the error between the extracted components and the original data in the mean square sense.Especially,this algorithm helps to create a bacterial foraging model based on particle swarm optimization(BF-PSO),by which the optimal wavelet coefficient is found for embedding and is used as the absolute feature of watermark embedding,thereby achieving the optimal balance between embedding capacity and imperceptibility.A series of experimental results from MATLAB software based on the standard MRI brain volume dataset demonstrate that the proposed algorithm has strong robustness and make the 3D model have small deformation after embedding the watermark. 展开更多
关键词 3-D medical watermarking robust watermarking PCA BF-PSO
下载PDF
A Lightweight CNN Based on Transfer Learning for COVID-19 Diagnosis 被引量:9
15
作者 Xiaorui Zhang Jie Zhou +1 位作者 Wei Sun Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2022年第7期1123-1137,共15页
The key to preventing the COVID-19 is to diagnose patients quickly and accurately.Studies have shown that using Convolutional Neural Networks(CNN)to analyze chest Computed Tomography(CT)images is helpful for timely CO... The key to preventing the COVID-19 is to diagnose patients quickly and accurately.Studies have shown that using Convolutional Neural Networks(CNN)to analyze chest Computed Tomography(CT)images is helpful for timely COVID-19 diagnosis.However,personal privacy issues,public chest CT data sets are relatively few,which has limited CNN’s application to COVID-19 diagnosis.Also,many CNNs have complex structures and massive parameters.Even if equipped with the dedicated Graphics Processing Unit(GPU)for acceleration,it still takes a long time,which is not conductive to widespread application.To solve above problems,this paper proposes a lightweight CNN classification model based on transfer learning.Use the lightweight CNN MobileNetV2 as the backbone of the model to solve the shortage of hardware resources and computing power.In order to alleviate the problem of model overfitting caused by insufficient data set,transfer learning is used to train the model.The study first exploits the weight parameters trained on the ImageNet database to initialize the MobileNetV2 network,and then retrain the model based on the CT image data set provided by Kaggle.Experimental results on a computer equipped only with the Central Processing Unit(CPU)show that it consumes only 1.06 s on average to diagnose a chest CT image.Compared to other lightweight models,the proposed model has a higher classification accuracy and reliability while having a lightweight architecture and few parameters,which can be easily applied to computers without GPU acceleration.Code:github.com/ZhouJie-520/paper-codes. 展开更多
关键词 Convolutional neural networks chest computed tomography image COVID-19 transfer learning mobileNetv2
下载PDF
Image Recognition of Citrus Diseases Based on Deep Learning 被引量:4
16
作者 Zongshuai Liu Xuyu Xiang +3 位作者 Jiaohua Qin Yun Tan Qin Zhang Neal N.Xiong 《Computers, Materials & Continua》 SCIE EI 2021年第1期457-466,共10页
In recent years,with the development of machine learning and deep learning,it is possible to identify and even control crop diseases by using electronic devices instead of manual observation.In this paper,an image rec... In recent years,with the development of machine learning and deep learning,it is possible to identify and even control crop diseases by using electronic devices instead of manual observation.In this paper,an image recognition method of citrus diseases based on deep learning is proposed.We built a citrus image dataset including six common citrus diseases.The deep learning network is used to train and learn these images,which can effectively identify and classify crop diseases.In the experiment,we use MobileNetV2 model as the primary network and compare it with other network models in the aspect of speed,model size,accuracy.Results show that our method reduces the prediction time consumption and model size while keeping a good classification accuracy.Finally,we discuss the significance of using MobileNetV2 to identify and classify agricultural diseases in mobile terminal,and put forward relevant suggestions. 展开更多
关键词 Deep learning image classification citrus diseases agriculture science and technology
下载PDF
The Characteristic Polynomial of the Mixed Arrangement 被引量:2
17
作者 SU Dan ZHANG Dunmu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第2期203-206,共4页
We consider the mixed arrangement which is composed of the central hyperplane arrangement and a sphere. We discuss the lattice of its intersection set and the relationship between the Mobius function of the mixed arra... We consider the mixed arrangement which is composed of the central hyperplane arrangement and a sphere. We discuss the lattice of its intersection set and the relationship between the Mobius function of the mixed arrangement and the original hyperplane arangement. The Mobius function of the mixed arrangement is equal to the positive or the negative Mobius function of original hyperplane arrangement. Moreover, we give an equality of the chambers and the characteristic polynomial for the mixed arrangement. 展开更多
关键词 mixed arrangement Mobius function characteristicpolynomial
下载PDF
MEIM:A Multi-Source Software Knowledge Entity Extraction Integration Model 被引量:1
18
作者 Wuqian Lv Zhifang Liao +1 位作者 Shengzong Liu Yan Zhang 《Computers, Materials & Continua》 SCIE EI 2021年第1期1027-1042,共16页
Entity recognition and extraction are the foundations of knowledge graph construction.Entity data in the field of software engineering come from different platforms and communities,and have different formats.This pape... Entity recognition and extraction are the foundations of knowledge graph construction.Entity data in the field of software engineering come from different platforms and communities,and have different formats.This paper divides multi-source software knowledge entities into unstructured data,semi-structured data and code data.For these different types of data,Bi-directional Long Short-Term Memory(Bi-LSTM)with Conditional Random Field(CRF),template matching,and abstract syntax tree are used and integrated into a multi-source software knowledge entity extraction integration model(MEIM)to extract software entities.The model can be updated continuously based on user’s feedbacks to improve the accuracy.To deal with the shortage of entity annotation datasets,keyword extraction methods based on Term Frequency–Inverse Document Frequency(TF-IDF),TextRank,and K-Means are applied to annotate tasks.The proposed MEIM model is applied to the Spring Boot framework,which demonstrates good adaptability.The extracted entities are used to construct a knowledge graph,which is applied to association retrieval and association visualization. 展开更多
关键词 Entity extraction software knowledge graph software data
下载PDF
An Ui Design Optimization Strategy for General App in Big Data Environment 被引量:1
19
作者 Hangjun Zhou Jieyu Zhou +5 位作者 Guang Sun Wangdong Jiang Chuntian Luo Xiaoping Fan Haowen Zhang Haoran Zhang 《Journal of Quantum Computing》 2019年第2期65-80,共16页
Due to the huge amount of increasing data, the requirements of people forelectronic products such as mobile phones, tablets, and notebooks are constantlyimproving. The development and design of various software applic... Due to the huge amount of increasing data, the requirements of people forelectronic products such as mobile phones, tablets, and notebooks are constantlyimproving. The development and design of various software applications attach greatimportance to users’ experiences. The rationalized UI design should allow a user not onlyenjoy the visual design experience of the new product but also operating it morepleasingly. This process is to enhance the attractiveness and performance of the newproduct and thus to promote the active usage and consuming conduct of users. In thispaper, an UI design optimization strategy for general APP in the big data environment isproposed to get better user experience while effectively obtaining information. Anexperimental example of a library APP is designed to optimize the user experience. Theexperimental results show that the user-centered UI design is the core of optimization,and user portrait based on big data platforms is the key to UI design. 展开更多
关键词 UI design big data general APP user portrait
下载PDF
Feedback Reliability Ratio of an Intrusion Detection System 被引量:1
20
作者 Usha Banerjee Gaurav Batra K. V. Arya 《Journal of Information Security》 2012年第3期238-244,共7页
The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious... The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure systems. Therefore adaptability, or the ability to learn and react to a consistently changing threat environment, is a key requirement for modern intrusion detection systems. In this paper we try to develop a novel metric to assess the performance of such intrusion detection systems under the influence of attacks. We propose a new metric called feedback reliability ratio for an intrusion detection system. We further try to modify and use the already available statistical Canberra distance metric and apply it to intrusion detection to quantify the dissimilarity between malicious elements and normal nodes in a network. 展开更多
关键词 ATTACKS Canberra METRIC FEEDBACK INTRUSION Detection Performance RELIABILITY
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部