Sentiment summary generation task is very valuable in social media, which can extract different aspects from people’s evaluation of products or services, such as the quality of products, and generate summarized opini...
详细信息
ISBN:
(数字)9798350349184
ISBN:
(纸本)9798350349191
Sentiment summary generation task is very valuable in social media, which can extract different aspects from people’s evaluation of products or services, such as the quality of products, and generate summarized opinionated sentiment summaries. And nowadays, sentiment summarization still suffers from insufficient contextual information capture and incorrect and comprehensive aspect extraction. In this paper, we propose a new strategy to solve the above problems: firstly, MILNET is used to automatically identify aspects related to a product or service from a large number of user reviews, and then the results are inputted into GCN, which is used to enhance the importance of contextual words close to the aspect; meanwhile, E-MABA is utilized for further optimization of the model on aspect extraction. By conducting a large number of experiments on the OPOSUM dataset and comparing the existing state-of-the-art methods, it is found that our method achieves better performance than other methods, proving the feasibility and effectiveness of our proposed strategy.
In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber ***,because the PowerShell language is dynamic by design and can construct script fragments at different levels,state-of-th...
详细信息
In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber ***,because the PowerShell language is dynamic by design and can construct script fragments at different levels,state-of-the-art static analysis based Power Shell attack detection approaches are inherently vulnerable to *** this paper,we design the first generic,effective,and lightweight deobfuscation approach for PowerShell *** precisely identify the obfuscated script fragments,we define obfuscation based on the differences in the impacts on the abstract syntax trees of PowerShell scripts and propose a novel emulation-based recovery ***,we design the first semantic-aware PowerShell attack detection system that leverages the classic objective-oriented association mining algorithm and newly identifies 31 semantic *** experimental results on 2342 benign samples and 4141 malicious samples show that our deobfuscation method takes less than 0.5 s on average and increases the similarity between the obfuscated and original scripts from 0.5%to 93.2%.By deploying our deobfuscation method,the attack detection rates for Windows Defender and VirusTotal increase substantially from 0.33%and 2.65%to 78.9%and 94.0%,***,our detection system outperforms both existing tools with a 96.7%true positive rate and a 0%false positive rate on average.
In this paper, we propose an algorithm for detecting artifacts in long-term video-EEG monitoring data in the problem of diagnosing cerebral ischemia after subarachnoid hemorrhage. The algorithm is based on a threshold...
详细信息
The positioning accuracy of a signal source is influenced by where the sensors are deployed. Studies in the literature for the optimal sensor placement (OSP) of localization often ignore the presence of sensor positio...
详细信息
Growing demands in today's industry results in increasingly stringent performance and throughput specifications. For accurate positioning of high-precision motion systems, feedforward control plays a crucial role....
详细信息
Complex mechatronic systems are typically composed of interconnected modules, often developed by independent teams. This development process challenges the verification of system specifications before all modules are ...
详细信息
This paper investigates the state-constrained controller design of a hypersonic flight vehicle(HFV) based on an asymmetric barrier Lyapunov function(ABLF). The robust adaptive back-stepping controller with integral te...
详细信息
This paper investigates the state-constrained controller design of a hypersonic flight vehicle(HFV) based on an asymmetric barrier Lyapunov function(ABLF). The robust adaptive back-stepping controller with integral terms is applied for the HFV longitudinal dynamics. Considering the asymmetric angle of attack(AOA) constraint caused by the unique structure and scramjet, the controller is modified by constructing an ABLF, where the asymmetric constraint on AOA tracking error is introduced. Combined with the constraint on virtual control, the AOA is restricted to a predefined asymmetric interval. The system stability and the AOA constraint are guaranteed via Lyapunov analysis. Simulation results verify that the AOA can be kept in the given asymmetric interval while the altitude reference signal is tracked.
Digitalization of health, healthcare and healthcare delivery unequivocal have positive consequences contributing to health system goals, but they also might have some negative ones which have to be avoided or mitigate...
详细信息
With the increasing need for sustainable energy sources, wind power has gained prominence as a clean and renewable option. Nevertheless, incorporating wind power into the electrical grid at a significant scale can hav...
With the increasing need for sustainable energy sources, wind power has gained prominence as a clean and renewable option. Nevertheless, incorporating wind power into the electrical grid at a significant scale can have a considerable impact on the dynamic behavior of the power system, leading to heightened operational uncertainties. The expanding requirement for power network connection to wind farms has led to the occurrence of rotor angle fluctuations and frequency instability. This paper utilizes a Static Synchronous Compensator (STATCOM) along with a multi-band power system stabilizer (MB-PSS) to assess the transient stability of a power grid. To demonstrate the system's efficiency under fault conditions, such as triple line-to-ground faults (LLLG), a nine-bus, three-machine test network incorporating a Doubly Fed Induction Generator (DFIG) has been employed. The system's performance has been evaluated through MATLAB/Simulink simulations, which reveal that the combination of STATCOM with MB-PSS produces superior results in enhancing transient stability when compared to the scenarios of using STATCOM alone or not using it at all.
This article discusses challenges, experiences and lessons learned so far while transforming a masonry build system based mostly on manual labour into a robot automated build system. Our motivation for selection of th...
This article discusses challenges, experiences and lessons learned so far while transforming a masonry build system based mostly on manual labour into a robot automated build system. Our motivation for selection of this masonry process is to try out how robot automation could impact the architects in their design work by providing a tool to directly manipulate wall expression down to individual brick level. Such manipulation is often much too costly for manual labour today. Moreover, masonry is a challenging application to automate. Understanding the manual processes involved and transforming them into automation equivalents faces several challenges; among them handling and distribution of the different materials involved, selection of tooling, sensing for handling of variation and digital tooling for the programming of the process. A novel parallel-kinematic manipulator (PKM) with computerized numerical control (CNC) is used as target for experiments, because the performance properties in stiffness, workspace and accuracy will allow us to extend work into further construction processes involving heavy and dirty manual labour.
暂无评论