Advanced Search
Displaying 11-20 on page 2 of 1426. Per Page  
  • Automated Chinese Essay Scoring Based on Deep Learning
  • Abstract Writing is an important part of language learning and is considered the best approach to demonstrate the comprehensive language skills of students. Manually grading student essays is a time-consuming task; however, it is necessary. An automated essay scoring system can not only greatly improve the efficiency of essay scoring, but also provide more objective score. Therefore, many researchers have been exploring automated essay scoring techniques and tools. However, the technique of scoring Chinese essays is still limited, and its accuracy needs to be enhanced further. To improve the accuracy of the scoring model for a Chinese essay, we propose an…
  • More
  •   Views:132       Downloads:104        Download PDF
  • Image Deblurring of Video Surveillance System in Rainy Environment
  • Abstract Video surveillance system is used in various fields such as transportation and social life. The bad weather can lead to the degradation of the video surveillance image quality. In rainy environment, the raindrops and the background are mixed, which lead to make the image degradation, so the removal of the raindrops has great significance for image restoration. In this article, after analyzing the inter-frame difference method in detecting and removing raindrops, a background difference method is proposed based on Gaussian model. In this method, the raindrop is regarded as a moving object relative to the background. The principle and procedure…
  • More
  •   Views:139       Downloads:106        Download PDF
  • Identification of Parameters in 2D-FEM of Valve Piping System within NPP Utilizing Seismic Response
  • Abstract Nuclear power plants (NPP) contain plenty of valve piping systems (VPS’s) which are categorized into high anti-seismic grades. Tasks such as seismic qualification, health monitoring and damage diagnosis of VPS’s in its design and operation processes all depend on finite element method. However, in engineering practice, there is always deviations between the theoretical and the measured responses due to the inaccurate value of the structural parameters in the model. The structure parameters identification of VPS within NPP is still an unexplored domain to a large extent. In this paper, the initial 2Dfinite element model (FEM) for VPS with a DN80…
  • More
  •   Views:130       Downloads:104        Download PDF
  • Multi-Level Feature-Based Ensemble Model for Target-Related Stance Detection
  • Abstract Stance detection is the task of attitude identification toward a standpoint. Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during higher-level abstracting. Moreover, because the target is not always mentioned in the text, most methods have ignored target information. In order to solve these problems, we propose a neural network ensemble method that combines the timing dependence bases on long short-term memory (LSTM) and the excellent extracting performance of convolutional neural networks (CNNs). The method can obtain multi-level features that consider both local and global features. We also…
  • More
  •   Views:147       Downloads:99        Download PDF
  • Identification of Crop Diseases Based on Improved Genetic Algorithm and Extreme Learning Machine
  • Abstract As an indispensable task in crop protection, the detection of crop diseases directly impacts the income of farmers. To address the problems of low crop-disease identification precision and detection abilities, a new method of detection is proposed based on improved genetic algorithm and extreme learning machine. Taking five different typical diseases with common crops as the objects, this method first preprocesses the images of crops and selects the optimal features for fusion. Then, it builds a model of crop disease identification for extreme learning machine, introduces the hill-climbing algorithm to improve the traditional genetic algorithm, optimizes the initial weights and…
  • More
  •   Views:126       Downloads:103        Download PDF
  • An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic
  • Abstract Coronaviruses are a well-known family of viruses that can infect humans or animals. Recently, the new coronavirus (COVID-19) has spread worldwide. All countries in the world are working hard to control the coronavirus disease. However, many countries are faced with a lack of medical equipment and an insufficient number of medical personnel because of the limitations of the medical system, which leads to the mass spread of diseases. As a powerful tool, artificial intelligence (AI) has been successfully applied to solve various complex problems ranging from big data analysis to computer vision. In the process of epidemic control, many algorithms…
  • More
  •   Views:155       Downloads:122        Download PDF
  • A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX
  • Abstract Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data integrity check module, to achieve…
  • More
  •   Views:140       Downloads:104        Download PDF
  • Ultrasound Speckle Reduction Based on Histogram Curve Matching and Region Growing
  • Abstract The quality of ultrasound scanning images is usually damaged by speckle noise. This paper proposes a method based on local statistics extracted from a histogram to reduce ultrasound speckle through a region growing algorithm. Unlike single statistical moment-based speckle reduction algorithms, this method adaptively smooths the speckle regions while preserving the margin and tissue structure to achieve high detectability. The criterion of a speckle region is defined by the similarity value obtained by matching the histogram of the current processing window and the reference window derived from the speckle region in advance. Then, according to the similarity value and tissue…
  • More
  •   Views:111       Downloads:98        Download PDF
  • Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT
  • Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven…
  • More
  •   Views:126       Downloads:105        Download PDF
  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
  • Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency…
  • More
  •   Views:132       Downloads:119        Download PDF
Displaying 11-20 on page 2 of 1426. Per Page