期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Intelligent Voice Instructor-Assistant System for Collaborative and Interactive Classes 被引量:1
1
作者 Matthew Baker Xiaohui Hu +1 位作者 Gennaro De Luca and Yinong Chen 《Journal of Artificial Intelligence and Technology》 2021年第2期121-130,共10页
College classes are becoming increasingly large.A critical component in scaling class size is the collaboration and interactions among instructors,teaching assistants,and students.We develop a prototype of an intellig... College classes are becoming increasingly large.A critical component in scaling class size is the collaboration and interactions among instructors,teaching assistants,and students.We develop a prototype of an intelligent voice instructorassistant system for supporting large classes,in which Amazon Web Services,Alexa Voice Services,and self-developed services are used.It uses a scraping service for reading the questions and answers from the past and current course discussion boards,organizes the questions in JavaScript object notation format,and stores them in the database,which can be accessed by Amazon web services Alexa skills.When a voice question from a student comes,Alexa is used for translating the voice sentence into texts.Then,Siamese deep long short-term memory model is introduced to calculate the similarity between the question asked and the questions in the database to find the best-matched answer.Questions with no match will be sent to the instructor,and instructor’s answer will be added into the database.Experiments show that the implemented model achieves promising results that can lead to a practical system.Intelligent voice instructor-assistant system starts with a small set of questions.It can grow through learning and improving when more and more questions are asked and answered. 展开更多
关键词 natural language processing voice processing machine learning Long short-term memory(LSTM)network questions and answers
下载PDF
创建软件定义网络中的进程级纵深防御体系结构 被引量:20
2
作者 崔竞松 郭迟 +2 位作者 陈龙 张雅娜 Dijiang HUANG 《软件学报》 EI CSCD 北大核心 2014年第10期2251-2265,共15页
云计算因其资源的弹性和可拓展性,在为用户提供各项服务时,相对于传统方式占据了先机.在用户考虑是否转向云计算时,一个极其重要的安全风险是:攻击者可以通过共享的云资源对云用户发起针对虚拟机的高效攻击.虚拟机作为云服务的基本资源... 云计算因其资源的弹性和可拓展性,在为用户提供各项服务时,相对于传统方式占据了先机.在用户考虑是否转向云计算时,一个极其重要的安全风险是:攻击者可以通过共享的云资源对云用户发起针对虚拟机的高效攻击.虚拟机作为云服务的基本资源,攻击者在攻击或者租用了某虚拟机之后,通过在其中部署恶意软件,并针对云内其他虚拟机发起更大范围的攻击行为,如分布式拒绝服务型攻击.为防止此种情况的发生,提出基于软件定义网络的纵深防御系统,以及时检测可疑虚拟机并控制其发出的流量,抑制来自该虚拟机的攻击行为并减轻因攻击所受到的影响.该系统以完全无代理的非侵入方式检测虚拟机状态,且基于软件定义网络,对同主机内虚拟机间或云主机间的网络流量进行进程级的监控.实验结果表明了该系统的有效性. 展开更多
关键词 无代理技术 内网防火墙 虚拟机纵深防御 网络虚拟化 软件定义网络
下载PDF
End-to-end dilated convolution network for document image semantic segmentation 被引量:8
3
作者 XU Can-hui SHI Cao CHEN Yi-nong 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第6期1765-1774,共10页
Semantic segmentation is a crucial step for document understanding.In this paper,an NVIDIA Jetson Nano-based platform is applied for implementing semantic segmentation for teaching artificial intelligence concepts and... Semantic segmentation is a crucial step for document understanding.In this paper,an NVIDIA Jetson Nano-based platform is applied for implementing semantic segmentation for teaching artificial intelligence concepts and programming.To extract semantic structures from document images,we present an end-to-end dilated convolution network architecture.Dilated convolutions have well-known advantages for extracting multi-scale context information without losing spatial resolution.Our model utilizes dilated convolutions with residual network to represent the image features and predicting pixel labels.The convolution part works as feature extractor to obtain multidimensional and hierarchical image features.The consecutive deconvolution is used for producing full resolution segmentation prediction.The probability of each pixel decides its predefined semantic class label.To understand segmentation granularity,we compare performances at three different levels.From fine grained class to coarse class levels,the proposed dilated convolution network architecture is evaluated on three document datasets.The experimental results have shown that both semantic data distribution imbalance and network depth are import factors that influence the document’s semantic segmentation performances.The research is aimed at offering an education resource for teaching artificial intelligence concepts and techniques. 展开更多
关键词 semantic segmentation document images deep learning NVIDIA jetson nano
下载PDF
Efficient Priority Packet Recovery Based on Network Coding in DVB-IPDC System
4
作者 WANG Lian PENG Daiyuan LIANG Hongbin 《China Communications》 SCIE CSCD 2015年第7期167-178,共12页
In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on... In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on the dynamic information updating, which can find the current most effective complete decoding packet. ECDR-NC can not only avoid the redundant encoding packets due to the overlapping among encoding packets, but also reduce the computational complexity compared with the traditional encoding schemes. Furthermore, the retransmission upper bound of ECDR-NC is fully controlled. In time-sensitive applications, to maximize the aggregate number of recovery packets while minimizing the total number of discarded packets due to the time limit according to the priority preference, the adaptive priority scheme EPNC is formulized, and the weighted relation graph is constructed to find the maximum-weighted encoding packets sequence according to the decoding gains. In the same network environment, the performances comparisons between PNC and EPNC show that EPNC is more efficient and more rational, and the average discarded packets ratios ofEPNC can be reduced about 18%~27%. The main contributions of this paper are an effective retransmission encoding packet selection algorithm ECDR-NC proposed, and a new adaptive priority recovery scheme EPNC introduced into DVB-IPDC system. 展开更多
关键词 digital video broadcasting(DVB) RETRANSMISSION network coding(NC) longterm evolution(LTE) wireless network
下载PDF
Attribute-Based Signature with Policy-and-Endorsement Mechanism 被引量:1
5
作者 王怀习 朱岩 +1 位作者 冯荣权 Stephen S.Yau 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1293-1304,共12页
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-end... In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups. 展开更多
关键词 cryptography fine-grained access control attribute-based signature policy-and-endorsement selfless anonymity existential unforgeability
原文传递
Recent progress and trends in predictive visual analytics 被引量:1
6
作者 Junhua LU Wei CHEN +4 位作者 Yuxin MA Junming KE Zongzhuang LI Fan ZHANG Ross MACIEJEWSKI 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第2期192-207,共16页
A wide variety of predictive analytics techniques have been developed in statistics, machine learning and data mining; however, many of these algorithms take a black-box approach in which data is input and future pred... A wide variety of predictive analytics techniques have been developed in statistics, machine learning and data mining; however, many of these algorithms take a black-box approach in which data is input and future predictions are output with no insight into what goes on during the process. Unfortunately, such a closed system approach often leaves little room for injecting domain expertise and can result in frustration from analysts when results seem snurious or confusing. In order to allow for more human-centric approaches, the visualization community has begun developing methods to enable users to incorporate expert knowledge into the pre- diction process at all stages, including data cleaning, feature selection, model building and model validation. This paper surveys current progress and trends in predictive visual ana- lytics, identifies the common framework in which predictive visual analytics systems operate, and develops a summariza- tion of the predictive analytics workfiow. 展开更多
关键词 predictive visual analytics VISUALIZATION visual analytics data mining predictive analysis
原文传递
A Brief Review of Network Embedding 被引量:4
7
作者 Yaojing Wang Yuan Yao +2 位作者 Hanghang Tong Feng Xu Jian Lu 《Big Data Mining and Analytics》 2019年第1期35-47,共13页
Learning the representations of nodes in a network can benefit various analysis tasks such as node classification, link prediction, clustering, and anomaly detection. Such a representation learning problem is referred... Learning the representations of nodes in a network can benefit various analysis tasks such as node classification, link prediction, clustering, and anomaly detection. Such a representation learning problem is referred to as network embedding, and it has attracted significant attention in recent years. In this article, we briefly review the existing network embedding methods by two taxonomies. The technical taxonomy focuses on the specific techniques used and divides the existing network embedding methods into two stages, i.e., context construction and objective design. The non-technical taxonomy focuses on the problem setting aspect and categorizes existing work based on whether to preserve special network properties, to consider special network types, or to incorporate additional inputs. Finally, we summarize the main findings based on the two taxonomies, analyze their usefulness,and discuss future directions in this area. 展开更多
关键词 NETWORK EMBEDDING NODE REPRESENTATIONS CONTEXT construction
原文传递
System architecture for high-performance permissioned blockchains 被引量:3
8
作者 Libo FENG Hui ZHANG +1 位作者 Wei-Tek TSAI Simeng SUN 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第6期1151-1165,共15页
Blockchain(BC),as an emerging distributed database technology with advanced security and reliability,has attracted much attention from experts who devoted to efinance,intellectual property protection,the internet of t... Blockchain(BC),as an emerging distributed database technology with advanced security and reliability,has attracted much attention from experts who devoted to efinance,intellectual property protection,the internet of things(IoT)and so forth.However,the inefficient transaction processing speed,which hinders the BC’s widespread,has not been well tackled yet.In this paper,we propose a novel architecture,called Dual-Channel Parallel Broadcast model(DCPB),which could address such a problem to a greater extent by using three methods which are dual communication channels,parallel pipeline processing and block broadcast strategy.In the dual-channel model,one channel processes transactions,and the other engages in the execution of BFT.The parallel pipeline processing allows the system to operate asynchronously.The block generation strategy improves the efficiency and speed of processing.Extensive experiments have been applied to BeihangChain,a simplified prototype for BC system,illustrates that its transaction processing speed could be improved to 16K transaction per second which could well support many real-world scenarios such as BC-based energy trading system and Micro-film copyright trading system in CCTV. 展开更多
关键词 blockchain CONCURRENCY PERFORMANCE dualchannel model parallel pipeline consensus algorithm
原文传递
Provably Secure Role-Based Encryption with Revocation Mechanism
9
作者 朱岩 胡宏新 +2 位作者 Gail-Joon Ahn 王怀习 王善标 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期697-710,共14页
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ... Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism based on partial-order key hierarchy with respect to the public key infrastructure, in which each user is assigned with a unique private-key to support user identification, and each role corresponds to a public group-key that is used to encrypt data. Based on this key hierarchy structure, our RBE scheme allows a sender to directly specify a role for encrypting data, which can be decrypted by all senior roles, as well as to revoke any subgroup of users and roles. We give a full proof of security of our scheme against hierarchical collusion attacks. In contrast to the existing solutions for encrypted file systems, our scheme not only supports dynamic joining and revoking users, but also has shorter ciphertexts and constant-size decryption keys. 展开更多
关键词 CRYPTOGRAPHY role-based encryption role hierarchy key hierarchy collusion security REVOCATION
原文传递
Global optimum encoding packet selection mechanism based on opportunistic network coding for wireless network retransmission
10
作者 Wang Lian Peng Daiyuan Liang Hongbin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第1期47-59,共13页
Packet loss cannot be avoided in wireless network due to wireless transmission medium particularity, therefore improving retransmission efficiency is meaningful to wireless transmission. The current retransmission pac... Packet loss cannot be avoided in wireless network due to wireless transmission medium particularity, therefore improving retransmission efficiency is meaningful to wireless transmission. The current retransmission packet selection mechanisms based on oppornistic network coding (ONC) face low retransmission efficiency and high computational complexity problems. To these problems, an optimized encoding packet selection mechanism based on ONC in wireless network retransmission (OONCR) is proposed. This mechanism is based on mutual exclusion packets and decoding gain concepts, and makes full use of ONC advantages. The main contributions of this scheme are to control the algorithm eomplexity of the maximum encoding packets selection effectively, avoid the redundancy encoding packets due to the overlapping among encoding packets, and take the encoding packet local and global optimization problem into consideration. Retransmission efficiency is evaluated according to the computational complexity, the throughput, the retransmission redundancy ratio, and the number of average retransmission. Under the various conditions, the number of average retransmission of OONCR is mainly lower than that of other typical retransmission packet selection schemes. The average retransmission redundancy ratios of OONCR are lower about 5%-40% compared with other typical schemes. Simultaneously the computational complexity of OONCR is comparatively lower than that of other typical schemes. 展开更多
关键词 wireless network RETRANSMISSION network coding THROUGHPUT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部