Advanced Search
Displaying 1-10 on page 1 of 1368. Per Page  
  • Information Classification and Extraction on Official Web Pages of Organizations
  • Abstract As a real-time and authoritative source, the official Web pages of organizations contain a large amount of information. The diversity of Web content and format makes it essential for pre-processing to get the unified attributed data, which has the value of organizational analysis and mining. The existing research on dealing with multiple Web scenarios and accuracy performance is insufficient. This paper aims to propose a method to transform organizational official Web pages into the data with attributes. After locating the active blocks in the Web pages, the structural and content features are proposed to classify information with the specific model.…
  • More
  •   Views:262       Downloads:225        Download PDF
  • Identification of Weather Phenomena Based on Lightweight Convolutional Neural Networks
  • Abstract Weather phenomenon recognition plays an important role in the field of meteorology. Nowadays, weather radars and weathers sensor have been widely used for weather recognition. However, given the high cost in deploying and maintaining the devices, it is difficult to apply them to intensive weather phenomenon recognition. Moreover, advanced machine learning models such as Convolutional Neural Networks (CNNs) have shown a lot of promise in meteorology, but these models also require intensive computation and large memory, which make it difficult to use them in reality. In practice, lightweight models are often used to solve such problems. However, lightweight models often…
  • More
  •   Views:220       Downloads:197        Download PDF
  • Bilateral Collaborative Optimization for Cloud Manufacturing Service
  • Abstract Manufacturing service composition of the supply side and scheduling of the demand side are two important components of Cloud Manufacturing, which directly affect the quality of Cloud Manufacturing services. However, the previous studies on the two components are carried out independently and thus ignoring the internal relations and mutual constraints. Considering the two components on both sides of the supply and the demand of Cloud Manufacturing services at the same time, a Bilateral Collaborative Optimization Model of Cloud Manufacturing (BCOM-CMfg) is constructed in this paper. In BCOM-CMfg, to solve the manufacturing service scheduling problem on the supply side, a new…
  • More
  •   Views:151       Downloads:118        Download PDF
  • A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
  • Abstract Covert channel of the packet ordering is a hot research topic. Encryption technology is not enough to protect the security of both sides of communication. Covert channel needs to hide the transmission data and protect content of communication. The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator. However, because the establishment of proxy communication needs to consume traffic, the communication capacity will be reduced, and in recent years, the tor technology often has vulnerabilities that led to the leakage of secret information. In this paper, the covert channel…
  • More
  •   Views:147       Downloads:117        Download PDF
  • A Recommendation Approach Based on Bayesian Networks for Clone Refactor
  • Abstract Reusing code fragments by copying and pasting them with or without minor adaptation is a common activity in software development. As a result, software systems often contain sections of code that are very similar, called code clones. Code clones are beneficial in reducing software development costs and development risks. However, recent studies have indicated some negative impacts as a result. In order to effectively manage and utilize the clones, we design an approach for recommending refactoring clones based on a Bayesian network. Firstly, clone codes are detected from the source code. Secondly, the clones that need to be refactored are…
  • More
  •   Views:116       Downloads:95        Download PDF
  • Image Super-Resolution Based on Generative Adversarial Networks: A Brief Review
  • Abstract Single image super resolution (SISR) is an important research content in the field of computer vision and image processing. With the rapid development of deep neural networks, different image super-resolution models have emerged. Compared to some traditional SISR methods, deep learning-based methods can complete the superresolution tasks through a single image. In addition, compared with the SISR methods using traditional convolutional neural networks, SISR based on generative adversarial networks (GAN) has achieved the most advanced visual performance. In this review, we first explore the challenges faced by SISR and introduce some common datasets and evaluation metrics. Then, we review the…
  • More
  •   Views:126       Downloads:101        Download PDF
  • A Recommendation Method for Highly Sparse Dataset Based on Teaching Recommendation Factorization Machines
  • Abstract There is no reasonable scientific basis for selecting the excellent teachers of the school’s courses. To solve the practical problem, we firstly give a series of normalization models for defining the key attributes of teachers’ professional foundation, course difficulty coefficient, and comprehensive evaluation of teaching. Then, we define a partial weight function to calculate the key attributes, and obtain the partial recommendation values. Next, we construct a highly sparse Teaching Recommendation Factorization Machines (TRFMs) model, which takes the 5-tuples relation including teacher, course, teachers’ professional foundation, course difficulty, teaching evaluation as the feature vector, and take partial recommendation value as…
  • More
  •   Views:106       Downloads:86        Download PDF
  • Research on Vehicle Routing Problem with Soft Time Windows Based on Hybrid Tabu Search and Scatter Search Algorithm
  • Abstract With the expansion of the application scope of social computing problems, many path problems in real life have evolved from pure path optimization problems to social computing problems that take into account various social attributes, cultures, and the emotional needs of customers. The actual soft time window vehicle routing problem, speeding up the response of customer needs, improving distribution efficiency, and reducing operating costs is the focus of current social computing problems. Therefore, designing fast and effective algorithms to solve this problem has certain theoretical and practical significance. In this paper, considering the time delay problem of customer demand, the…
  • More
  •   Views:134       Downloads:89        Download PDF
  • A Haze Feature Extraction and Pollution Level Identification Pre-Warning Algorithm
  • Abstract The prediction of particles less than 2.5 micrometers in diameter (PM2.5) in fog and haze has been paid more and more attention, but the prediction accuracy of the results is not ideal. Haze prediction algorithms based on traditional numerical and statistical prediction have poor effects on nonlinear data prediction of haze. In order to improve the effects of prediction, this paper proposes a haze feature extraction and pollution level identification pre-warning algorithm based on feature selection and integrated learning. Minimum Redundancy Maximum Relevance method is used to extract low-level features of haze, and deep confidence network is utilized to extract…
  • More
  •   Views:127       Downloads:81        Download PDF
  • Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution
  • Abstract Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes the provider send a secret key sequence to the user obliviously, i.e., the user may only get almost one bit key in the sequence which is unknown to the provider. Recently, a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution (QOKD) from the well-known expression of quantum key distribution (QKD). In this paper, a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities,…
  • More
  •   Views:110       Downloads:79        Download PDF
Displaying 1-10 on page 1 of 1368. Per Page