Advanced Search
Displaying 21-30 on page 3 of 1426. Per Page  
  • Identifying Game Processes Based on Private Working Sets
  • Abstract Fueled by the booming online games, there is an increasing demand for monitoring online games in various settings. One of the application scenarios is the monitor of computer games in school computer labs, for which an intelligent game recognition method is required. In this paper, a method to identify game processes in accordance with private working sets (i.e., the amount of memory occupied by a process but cannot be shared among other processes) is introduced. Results of the W test showed that the memory sizes occupied by the legitimate processes (e.g., the processes of common native windows applications) and game…
  • More
  •   Views:151       Downloads:116        Download PDF
  • Semi-GSGCN: Social Robot Detection Research with Graph Neural Network
  • Abstract Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection…
  • More
  •   Views:119       Downloads:116        Download PDF
  • A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen
  • Abstract As an extension of the traditional encryption technology, information hiding has been increasingly used in the fields of communication and network media, and the covert communication technology has gradually developed. The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance, which can effectively alleviate the disadvantages and problems of traditional covert communication. However, its combination with covert communication thus far has been mostly at the theoretical level. The BLOCCE method, as an early result of the combination of blockchain and covert communication technology, has the problems of low information embedding efficiency, the use…
  • More
  •   Views:133       Downloads:114        Download PDF
  • Automatic Terrain Debris Recognition Network Based on 3D Remote Sensing Data
  • Abstract Although predecessors have made great contributions to the semantic segmentation of 3D indoor scenes, there still exist some challenges in the debris recognition of terrain data. Compared with hundreds of thousands of indoor point clouds, the amount of terrain point cloud is up to millions. Apart from that, terrain point cloud data obtained from remote sensing is measured in meters, but the indoor scene is measured in centimeters. In this case, the terrain debris obtained from remote sensing mapping only have dozens of points, which means that sufficient training information cannot be obtained only through the convolution of points. In…
  • More
  •   Views:153       Downloads:98        Download PDF
  • Ore Image Segmentation Method Based on U-Net and Watershed
  • Abstract Ore image segmentation is a key step in an ore grain size analysis based on image processing. The traditional segmentation methods do not deal with ore textures and shadows in ore images well Those methods often suffer from under-segmentation and over-segmentation. In this article, in order to solve the problem, an ore image segmentation method based on U-Net is proposed. We adjust the structure of U-Net to speed up the processing, and we modify the loss function to enhance the generalization of the model. After the collection of the ore image, we design the annotation standard and train the network…
  • More
  •   Views:121       Downloads:107        Download PDF
  • Accurate Multi-Scale Feature Fusion CNN for Time Series Classification in Smart Factory
  • Abstract Time series classification (TSC) has attracted various attention in the community of machine learning and data mining and has many successful applications such as fault detection and product identification in the process of building a smart factory. However, it is still challenging for the efficiency and accuracy of classification due to complexity, multi-dimension of time series. This paper presents a new approach for time series classification based on convolutional neural networks (CNN). The proposed method contains three parts: short-time gap feature extraction, multi-scale local feature learning, and global feature learning. In the process of short-time gap feature extraction, large kernel…
  • More
  •   Views:235       Downloads:114        Download PDF
  • Jointly Part-of-Speech Tagging and Semantic Role Labeling Using Auxiliary Deep Neural Network Model
  • Abstract Previous studies have shown that there is potential semantic dependency between part-of-speech and semantic roles. At the same time, the predicate-argument structure in a sentence is important information for semantic role labeling task. In this work, we introduce the auxiliary deep neural network model, which models semantic dependency between part-of-speech and semantic roles and incorporates the information of predicate-argument into semantic role labeling. Based on the framework of joint learning, part-of-speech tagging is used as an auxiliary task to improve the result of the semantic role labeling. In addition, we introduce the argument recognition layer in the training process of…
  • More
  •   Views:132       Downloads:110        Download PDF
  • Image Processing of Manganese Nodules Based on Background Gray Value Calculation
  • Abstract To troubleshoot two problems arising from the segmentation of manganese nodule images-uneven illumination and morphological defects caused by white sand coverage, we propose, with reference to features of manganese nodules, a method called “background gray value calculation”. As the result of the image procession with the aid this method, the two problems above are solved eventually, together with acquisition of a segmentable image of manganese nodules. As a result, its comparison with other segmentation methods justifies its feasibility and stability. Judging from simulation results, it is indicated that this method is applicable to repair the target shape in the image,…
  • More
  •   Views:144       Downloads:104        Download PDF
  • A Novel Method of Heart Failure Prediction Based on DPCNNXGBOOST Model
  • Abstract The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients. Existing methods depend on the judgment of doctors, the results are affected by many factors such as doctors’ knowledge and experience. The accuracy is difficult to guarantee and has a serious lag. In this paper, a mixture prediction model is proposed for perioperative adverse events of heart failure, which combined with the advantages of the Deep Pyramid Convolutional Neural Networks (DPCNN) and Extreme Gradient Boosting (XGBOOST). The DPCNN was used to automatically extract features from patient’s diagnostic texts, and the text…
  • More
  •   Views:132       Downloads:103        Download PDF
  • Auxiliary Diagnosis Based on the Knowledge Graph of TCM Syndrome
  • Abstract As one of the most valuable assets in China, traditional medicine has a long history and contains pieces of knowledge. The diagnosis and treatment of Traditional Chinese Medicine (TCM) has benefited from the natural language processing technology. This paper proposes a knowledge-based syndrome reasoning method in computerassisted diagnosis. This method is based on the established knowledge graph of TCM and this paper introduces the reinforcement learning algorithm to mine the hidden relationship among the entities and obtain the reasoning path. According to this reasoning path, we could infer the path from the symptoms to the syndrome and get all possibilities…
  • More
  •   Views:124       Downloads:107        Download PDF
Displaying 21-30 on page 3 of 1426. Per Page