Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and s...
详细信息
Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and scale and thus cannot fully exploit and utilise sentiment feature information,making their performance less than *** resolve the problem,the authors propose a new method,GP‐FMLNet,that integrates both glyph and phonetic information and design a novel feature matrix learning process for phonetic features with which to model words that have the same pinyin information but different glyph *** method solves the problem of misspelling words influencing sentiment polarity prediction ***,the authors iteratively mine character,glyph,and pinyin features from the input comments ***,the authors use soft attention and matrix compound modules to model the phonetic features,which empowers their model to keep on zeroing in on the dynamic‐setting words in various positions and to dispense with the impacts of the deceptive‐setting ***-periments on six public datasets prove that the proposed model fully utilises the glyph and phonetic information and improves on the performance of existing Chinese senti-ment analysis algorithms.
Over the past decade, the antecedents of electronic payment (e-payment) adoption have been studied extensively in the extant literature. Nonetheless, these studies have often investigated how individual antecedents af...
详细信息
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been em...
详细信息
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been employed in the Intelligent Transport System (ITS) to provide services for convenient and safe traveling, effective traffic management, and smart signal control. Most of these frameworks typically involve learning processes that utilize learning algorithms and requires training data. For highway traffic, the Greenshields model offers a practical relationship among vehicle speeds, traffic flows, and traffic density, which can serve as fundamental knowledge for developing intelligent traffic management systems. This paper proposes a fuzzy logic system based on the Greenshields model as the knowledge base for quickly predicting highway traffic congestion without extensive preparing data. Our system operates in two modes: jam and non-jam modes. In each model, the two inputs of vehicle speed and traffic flow are processed respectively with specified membership functions for effective fuzzification. The set of rules and conditions guided by the Greenshields theory is governed by the inference mechanism, which makes decisions according to the input field. Subsequently, the defuzzification process converts the fuzzy sets obtained by the inference engine into a congestion level as the output. To validate the accuracy of our system, a polynomial regression model utilizing realistic data from roadside equipment on the Sun Yat-Sen Highway in Taiwan is established for comparison. Comparing the observed data points from the polynomial regression model with the outputs obtained from our system using the same inputs, both predicting outputs are found to be consistent, affirming the practical feasibility of the proposed system. Moreover, our proposed scheme is adaptable to suit diverse road conditions without extensive training data and possesses a short memory to perform
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
This paper investigates the multi-Unmanned Aerial Vehicle(UAV)-assisted wireless-powered Mobile Edge Computing(MEC)system,where UAVs provide computation and powering services to mobile *** aim to maximize the number o...
详细信息
This paper investigates the multi-Unmanned Aerial Vehicle(UAV)-assisted wireless-powered Mobile Edge Computing(MEC)system,where UAVs provide computation and powering services to mobile *** aim to maximize the number of completed computation tasks by jointly optimizing the offloading decisions of all terminals and the trajectory planning of all *** action space of the system is extremely large and grows exponentially with the number of *** this case,single-agent learning will require an overlarge neural network,resulting in insufficient ***,the offloading decisions and trajectory planning are two subproblems performed by different executants,providing an opportunity for *** thus adopt the idea of decomposition and propose a 2-Tiered Multi-agent Soft Actor-Critic(2T-MSAC)algorithm,decomposing a single neural network into multiple small-scale *** the first tier,a single agent is used for offloading decisions,and an online pretrained model based on imitation learning is specially designed to accelerate the training process of this *** the second tier,UAVs utilize multiple agents to plan their *** agent exerts its influence on the parameter update of other agents through actions and rewards,thereby achieving joint *** results demonstrate that the proposed algorithm can be applied to scenarios with various location distributions of terminals,outperforming existing benchmarks that perform well only in specific *** particular,2T-MSAC increases the number of completed tasks by 45.5%in the scenario with uneven terminal ***,the pretrained model based on imitation learning reduces the convergence time of 2T-MSAC by 58.2%.
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit...
详细信息
High-performance computing (HPC) systems has entered the exascale era, but I/O performance has lagged behind due to storage hardware limitations, creating a "storage wall effect"that hinders HPC systems full...
详细信息
Visual object tracking can be divided into the object classification and bounding-box regression tasks, but only one sharing correlation map leads to inaccuracy. Siamese trackers compute correlation map by cross-corre...
详细信息
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g...
详细信息
暂无评论