Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    An Intelligent Tumors Coding Method Based on Drools

    Panjie Yang1,*,#, Gang Liu2,#, Xiaoyu Li1,*, Liyuan Qin1, Xiaoxia Liu3

    Journal of New Media, Vol.2, No.3, pp. 111-119, 2020, DOI:10.32604/jnm.2020.010135

    Abstract In order to solve the problems of low efficiency and heavy workload of tumor coding in hospitals, we proposed a Drools-based intelligent tumors coding method. At present, most tumor hospitals use manual coding, the trained coders follow the main diagnosis selection rules to select the main diagnosis from the discharge diagnosis of the tumor patients, and then code all the discharge diagnoses according to the coding rules. Owing to different coders have different familiarity with the main diagnosis selection rules and ICD-10 disease coding, it will reduce the efficiency of the artificial coding results and affect the quality of the… More >

  • Open Access

    ARTICLE

    Research on Prediction Methods of Energy Consumption Data

    Ning Chen1, Naernaer Xialihaer2,3, Weiliang Kong3, Jiping Ren2,3,*

    Journal of New Media, Vol.2, No.3, pp. 99-109, 2020, DOI:10.32604/jnm.2020.09889

    Abstract This paper analyzes the energy consumption situation in Beijing, based on the comparison of common energy consumption prediction methods. Here we use multiple linear regression analysis, grey prediction, BP neural net-work prediction, grey BP neural network prediction combined method, LSTM long-term and short-term memory network model prediction method. Firstly, before constructing the model, the whole model is explained theoretically. The advantages and disadvantages of each model are analyzed before the modeling, and the corresponding advantages and disadvantages of these models are pointed out. Finally, these models are used to construct the Beijing energy forecasting model, and some years are selected… More >

  • Open Access

    ARTICLE

    Analysis and Prediction of New Media Information Dissemination of Police Microblog

    Leyao Chen, Lei Hong*, Jiayin Liu

    Journal of New Media, Vol.2, No.2, pp. 91-98, 2020, DOI:10.32604/jnm.2020.010125

    Abstract This paper aims to analyze the microblog data published by the official account in a certain province of China, and finds out the rule of Weibo that is easier to be forwarded in the new police media perspective. In this paper, a new topic-based model is proposed. Firstly, the LDA topic clustering algorithm is used to extract the topic categories with forwarding heat from the microblogs with high forwarding numbers, then the Naive Bayesian algorithm is used to topic categories. The sample data is processed to predict the type of microblog forwarding. In order to evaluate this method, a large… More >

  • Open Access

    ARTICLE

    User Behavior Path Analysis Based on Sales Data

    Wangdong Jiang, Dongling Zhang*, Yapeng Peng, Guang Sun, Ying Cao, Jing Li

    Journal of New Media, Vol.2, No.2, pp. 79-90, 2020, DOI:10.32604/jnm.2020.010088

    Abstract With the rapid development of science and technology and the increasing popularity of the Internet, the number of network users is gradually expanding, and the behavior of network users is becoming more and more complex. Users’ actual demand for resources on the network application platform is closely related to their historical behavior records. Therefore, it is very important to analyze the user behavior path conversion rate. Therefore, this paper analyses and studies user behavior path based on sales data. Through analyzing the user quality of the website as well as the user’s repurchase rate, repurchase rate and retention rate in… More >

  • Open Access

    ARTICLE

    Edge Detection Based on Generative Adversarial Networks

    Xiaoyan Chen, Jiahuan Chen*, Zhongcheng Sha

    Journal of New Media, Vol.2, No.2, pp. 61-77, 2020, DOI:10.32604/jnm.2020.010062

    Abstract Aiming at the problem that the detection effect of traditional edge detection algorithm is not good, and the problem that the existing edge detection algorithm based on convolution network cannot solve the thick edge problem from the model itself, this paper proposes a new edge detection method based on the generative adversarial network. The confrontation network consists of generator network and discriminator network, generator network is composed of U-net network and discriminator network is composed of five-layer convolution network. In this paper, we use BSDS500 training data set to train the model. Finally, several images are randomly selected from BSDS500… More >

  • Open Access

    REVIEW

    A Review of Person Re-Identification

    Tong Jiang*

    Journal of New Media, Vol.2, No.2, pp. 45-60, 2020, DOI:10.32604/jnm.2020.09823

    Abstract Recently, person Re-identification (person Re-id) has attracted more and more attention, which has become a research focus of computer vision community. Person Re-id is used to ascertain whether the target pedestrians captured by cameras in different positions at different moments are the same person or not. However, due to the influence of various complex factors, person Re-id still has a lot of holes to be filled. In this paper, we first review the research process of person Re-id, and then, two kinds of mainstream methods for person Re-id are introduced respectively, according to the different types of training data they… More >

  • Open Access

    ARTICLE

    Authorized Attribute-Based Encryption Multi-Keywords Search with Policy Updating

    Muqadar Ali, Chungen Xu*, Abid Hussain

    Journal of New Media, Vol.2, No.1, pp. 31-43, 2020, DOI:10.32604/jnm.2020.09946

    Abstract Attribute-based encryption is cryptographic techniques that provide flexible data access control to encrypted data content in cloud storage. Each trusted authority needs proper management and distribution of secret keys to the user’s to only authorized user’s attributes. However existing schemes cannot be applied multiple authority that supports only a single keywords search compare to multi keywords search high computational burden or inefficient attribute’s revocation. In this paper, a ciphertext policy attribute-based encryption (CP-ABE) scheme has been proposed which focuses on multi-keyword search and attribute revocation by new policy updating feathers under multiple authorities and central authority. The data owner encrypts… More >

  • Open Access

    ARTICLE

    Knowledge Graph Representation Reasoning for Recommendation System

    Tao Li, Hao Li*, Sheng Zhong, Yan Kang, Yachuan Zhang, Rongjing Bu, Yang Hu

    Journal of New Media, Vol.2, No.1, pp. 21-30, 2020, DOI:10.32604/jnm.2020.09767

    Abstract In view of the low interpretability of existing collaborative filtering recommendation algorithms and the difficulty of extracting information from content-based recommendation algorithms, we propose an efficient KGRS model. KGRS first obtains reasoning paths of knowledge graph and embeds the entities of paths into vectors based on knowledge representation learning TransD algorithm, then uses LSTM and soft attention mechanism to capture the semantic of each path reasoning, then uses convolution operation and pooling operation to distinguish the importance of different paths reasoning. Finally, through the full connection layer and sigmoid function to get the prediction ratings, and the items are sorted… More >

  • Open Access

    ARTICLE

    A LoRaWAN Access Technology Based on Channel Adaptive Adjustment

    Li Ma, Meng Zhao*, Dongchao Ma, Yingxun Fu

    Journal of New Media, Vol.2, No.1, pp. 11-20, 2020, DOI:10.32604/jnm.2020.09715

    Abstract Low-power wide area network (LPWAN) has developed rapidly in recent years and is widely used in various Internet of Things (IoT) services. In order to reduce cost and power consumption, wide coverage, LPWAN tends to use simple channel access control protocols, such as the Aloha protocol. This protocol is simple with poor extension capability. In high-density environment, Aloha protocol will lead to low channel utilization, prolonged access and high conflict probability. Therefore, in order to solve the above problems, we propose an enhanced channel access control mechanism based on the existing LoRaWAN protocol, that is, a dynamic listening backoff mechanism.… More >

  • Open Access

    ARTICLE

    Mixed Noise Removal by Residual Learning of Deep CNN

    Kang Yang1, Jielin Jiang1,2,*, Zhaoqing Pan1,2

    Journal of New Media, Vol.2, No.1, pp. 1-10, 2020, DOI:10.32604/jnm.2020.09356

    Abstract Due to the huge difference of noise distribution, the result of a mixture of multiple noises becomes very complicated. Under normal circumstances, the most common type of mixed noise is to add impulse noise (IN) and then white Gaussian noise (AWGN). From the reduction of cascaded IN and AWGN to the latest sparse representation, a great deal of methods has been proposed to reduce this form of mixed noise. However, when the mixed noise is very strong, most methods often produce a lot of artifacts. In order to solve the above problems, we propose a method based on residual learning… More >

Displaying 51-60 on page 6 of 71. Per Page