Advanced Search
Displaying 1-10 on page 1 of 14332. Per Page  

Articles / Online

  • Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction
  • Abstract Active learning methods which present selected examples from the corpus for annotation provide more efficient learning of supervised relation extraction models, but they leave the developer in the unenviable role of a passive informant. To restore the developer’s proper role as a partner with the system, we must give the developer an ability to inspect the extraction model during development. We propose to make this possible through a representation based on lexicalized dependency paths (LDPs) coupled with an active learner for LDPs. We apply LDPs to both simulated and real active learning with ACE as evaluation and a year’s newswire…
  • More
  •   Views:119       Downloads:60        Download PDF
  • Selfish Mining and Defending Strategies in the Bitcoin
  • Abstract As a kind of distributed, decentralized and peer-to-peer transmitted technology, blockchain technology has gradually changed people’s lifestyle. However, blockchain technology also faces many problems including selfish mining attack, which causes serious effects to the development of blockchain technology. Selfish mining is a kind of mining strategy where selfish miners increase their profit by selectively publishing hidden blocks. This paper builds the selfish mining model from the perspective of node state conversion and utilize the function extremum method to figure out the optimal profit of this model. Meanwhile, based on the experimental data of honest mining, the author conducts the simulation…
  • More
  •   Views:56       Downloads:40        Download PDF
  • Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights
  • Abstract With the rapid development of digitization technology, digital copyright of museum has become more and more valuable. Its collections can be opened to and shared with the people through the Internet. However, centralized authorization, untransparent transaction information and risk of tampering data in traditional digital rights management have a strong impact on system normal operation. In this paper, we proposed a blockchain-based digital rights management scheme (BMDRM) that realizes a distributed digital rights management and authorization system by introducing non-fungible tokens (NFTs) and smart contracts. To ensure the security and efficiency of transactions and authorization, we store all processing data…
  • More
  •   Views:52       Downloads:39        Download PDF
  • Application of CNN and Long Short-Term Memory Network in Water Quality Predicting
  • Abstract Water resources are an indispensable precious resource for human survival and development. Water quality prediction plays a vital role in protecting and enhancing water resources. Changes in water quality are influenced by many factors, both long-term and short-term. Therefore, according to water quality changes’ periodic and nonlinear characteristics, this paper considered dissolved oxygen as the research object and constructed a neural network model combining convolutional neural network (CNN) and long short-term memory network (LSTM) to predict dissolved oxygen index in water quality. Firstly, we preprocessed the water quality data set obtained from the water quality monitoring platform. Secondly, we used…
  • More
  •   Views:57       Downloads:40        Download PDF
  • Consensus Mechanism of Blockchain Based on PoR with Data Deduplication
  • Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount of redundant data, which inevitably…
  • More
  •   Views:59       Downloads:29        Download PDF
  • Criss-Cross Attention Based Auto Encoder for Video Anomaly Event Detection
  • Abstract The surveillance applications generate enormous video data and present challenges to video analysis for huge human labor cost. Reconstruction-based convolutional autoencoders have achieved great success in video anomaly detection for their ability of automatically detecting abnormal event. The approaches learn normal patterns only with the normal data in an unsupervised way due to the difficulty of collecting anomaly samples and obtaining anomaly annotations. But convolutional autoencoders have limitations in global feature extraction for the local receptive field of convolutional kernels. What is more, 2-dimensional convolution lacks the capability of capturing temporal information while videos change over time. In this paper,…
  • More
  •   Views:44       Downloads:27        Download PDF
  • SSAG-Net: Syntactic and Semantic Attention-Guided Machine Reading Comprehension
  • Abstract Machine reading comprehension (MRC) is a task in natural language comprehension. It assesses machine reading comprehension based on text reading and answering questions. Traditional attention methods typically focus on one of syntax or semantics, or integrate syntax and semantics through a manual method, leaving the model unable to fully utilize syntax and semantics for MRC tasks. In order to better understand syntactic and semantic information and improve machine reading comprehension, our study uses syntactic and semantic attention to conduct text modeling for tasks. Based on the BERT model of Transformer encoder, we separate a text into two branches: syntax part…
  • More
  •   Views:28       Downloads:21        Download PDF
  • A New Route Optimization Approach of Fresh Agricultural Logistics Distribution
  • Abstract Under the fierce market competition and the demand of low-carbon economy, the freshness of fresh products directly determines the degree of customer satisfaction. Cold chain logistics companies must pay attention to the freshness and carbon emissions of fresh products to obtain better service development. In the cold chain logistics path optimization problem, considering the cost, product freshness and carbon emission environmental factors at the same time, based on the cost-benefit idea, a comprehensive cold chain vehicle routing problem optimization model is proposed to minimize the unit cost of product freshness and the carbon trading mechanism for calculating the cost of…
  • More
  •   Views:32       Downloads:18        Download PDF
  • Attention Weight is Indispensable in Joint Entity and Relation Extraction
  • Abstract Joint entity and relation extraction (JERE) is an important foundation for unstructured knowledge extraction in natural language processing (NLP). Thus, designing efficient algorithms for it has become a vital task. Although existing methods can efficiently extract entities and relations, their performance should be improved. In this paper, we propose a novel model called Attention and Span-based Entity and Relation Transformer (ASpERT) for JERE. First, differing from the traditional approach that only considers the last hidden layer as the feature embedding, ASpERT concatenates the attention head information of each layer with the information of the last hidden layer by using an…
  • More
  •   Views:34       Downloads:12        Download PDF
  • Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks
  • Abstract Recently, the exponential utilization of Internet has posed several cybersecurity issues in social networks. Particularly, cyberbulling becomes a common threat to users in real time environment. Automated detection and classification of cyberbullying in social networks become an essential task, which can be derived by the use of machine learning (ML) and deep learning (DL) approaches. Since the hyperparameters of the DL model are important for optimal outcomes, appropriate tuning strategy becomes important by the use of metaheuristic optimization algorithms. In this study, an effective glowworm swarm optimization (GSO) with deep neural network (DNN) model named EGSO-DNN is derived for cybersecurity…
  • More
  •   Views:39       Downloads:9        Download PDF
Displaying 1-10 on page 1 of 14332. Per Page