Detecting short near-duplicates is significant in information retrieval system. In this paper, we propose a novel semantics-encoded method to improve word semantic representation learning and apply it on an improved h...
详细信息
ISBN:
(纸本)9781538665657
Detecting short near-duplicates is significant in information retrieval system. In this paper, we propose a novel semantics-encoded method to improve word semantic representation learning and apply it on an improved hash method to detect short near-duplicates. We evaluate our model in SICK dataset and result shows our methodology outperforms all previous baseline model. the result indicates the correctness and good efficiency of our methodology.
In this research, a method for recovering software9;s evolution history based on software architecture reverse was proposed, and the evolutionary binary-free9;s constructing algorithm as well as the system for e...
详细信息
ISBN:
(纸本)9781538665657
In this research, a method for recovering software's evolution history based on software architecture reverse was proposed, and the evolutionary binary-free's constructing algorithm as well as the system for evolutionary binary-tree's construction are introduced. At last, we draw a conclusion that the method is effective by regarding three open source systems as experimental objects.
Personalized recommendation technology is a new technology which can mine products by using users information, and that meet users preferences through a series of algorithms, so as to achieve better recommendation eff...
详细信息
ISBN:
(纸本)9781538665657
Personalized recommendation technology is a new technology which can mine products by using users information, and that meet users preferences through a series of algorithms, so as to achieve better recommendation effect. the number of books in university library is increasing rapidly. How to find interesting books from a large number of books is a problem that every reader is concerned about. In order to help these users find the books that they are interested in, this author designs a books recommendation system based on collaborative filtering algorithm the system can basically meet the needs of users to recommend functions, and achieved good results.
Bandwidth-constrained network has the characteristics of unstable communication quality and unsynchronized information transmission. Aiming at these, this paper presents an adaptive service description method for band...
详细信息
ISBN:
(纸本)9781538665657
Bandwidth-constrained network has the characteristics of unstable communication quality and unsynchronized information transmission. Aiming at these, this paper presents an adaptive service description method for bandwidth-constrained network, which divided the bandwidth constrained network into three levels, and two indices, Importance level and Real-time level are put forward to evaluate the comprehensive importance level for service description files. By combing them withthe giving service simplify principles and update mechanism, the service description file can be simplified adaptively in different network level. Experimental results show that this approach can reduce the service access time and response time in bandwidth-constrained network effectively.
In recent years, with Bitcoin taking the lead, the blockchain technology has been put in the spotlight as it introduced a method for multiple parties to achieve consensus without trust. Nevertheless, the according app...
详细信息
ISBN:
(纸本)9781538665657
In recent years, with Bitcoin taking the lead, the blockchain technology has been put in the spotlight as it introduced a method for multiple parties to achieve consensus without trust. Nevertheless, the according application is constrained due to its limitations in scalability. In this paper, we proposed a highly scalable consensus model based on majority voting cellular automata, namely the MOCA consensus, with a distinctive blockchain-based distributed ledger in which the state change of each node depends on its neighbors. MOCA consensus origins from the zero-temperature Ising model with spontaneous magnetization achieving scalability of number of nodes with high probability Byzantine fault tolerance.
Making use of open source software is always a hot topic. Code transplantation is a new idea just proposed for several years, several tools has been built, but no one can solve the problem of open source software tran...
详细信息
ISBN:
(纸本)9781538665657
Making use of open source software is always a hot topic. Code transplantation is a new idea just proposed for several years, several tools has been built, but no one can solve the problem of open source software transplantation. Abstract syntax tree is a useful way to analyze source code, base on current research, this paper proposes a new method to deal withthe code extraction part of transplantation. the experiment result reveals that our method can reduce programmer's work of analyze code, make code extraction more convenient and can be used to real word software.
this paper introduced a new software named Design and Analysis System for Testability engineering (DASTE) developed for PHM-oriented design for testablhty (DFT) aiming at assisting developers Improve their designs. Fi...
详细信息
ISBN:
(纸本)9781538665657
this paper introduced a new software named Design and Analysis System for Testability engineering (DASTE) developed for PHM-oriented design for testablhty (DFT) aiming at assisting developers Improve their designs. First, we developed a visual development environment based on multi-signal flow graph model. Second, we got a failure-test dependency matrix by analyzing the relationship between failures and symptoms, and the relationship between tests and symptems. Next, we analyzed the testability indices according the dependency matrix and fault propagation time. Last, an amplifier circuit as an example is used to verity the function ofthe DASTE.
暂无评论