Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and s...
详细信息
Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and scale and thus cannot fully exploit and utilise sentiment feature information,making their performance less than *** resolve the problem,the authors propose a new method,GP‐FMLNet,that integrates both glyph and phonetic information and design a novel feature matrix learning process for phonetic features with which to model words that have the same pinyin information but different glyph *** method solves the problem of misspelling words influencing sentiment polarity prediction ***,the authors iteratively mine character,glyph,and pinyin features from the input comments ***,the authors use soft attention and matrix compound modules to model the phonetic features,which empowers their model to keep on zeroing in on the dynamic‐setting words in various positions and to dispense with the impacts of the deceptive‐setting ***-periments on six public datasets prove that the proposed model fully utilises the glyph and phonetic information and improves on the performance of existing Chinese senti-ment analysis algorithms.
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices...
详细信息
Interference management is one of the most important issues in the device-to-device(D2D)-enabled heterogeneous cellular networks(HetCNets)due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular *** alleviate the interference,an efficient interference management way is to set exclusion zones around the cellular *** this paper,we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled *** main difficulties contain three aspects:1)how to model the location randomness of base stations,cellular and D2D users in practical networks;2)how to capture the randomness and interrelation of cellular and D2D transmissions due to the existence of random exclusion zones;3)how to characterize the different types of interference and their impacts on the outage probabilities of cellular and D2D *** then run extensive Monte-Carlo simulations which manifest that our theoretical model is very accurate.
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
Calculated parameters(soil layer resistivity,soil layer thickness,and the number of soil layers)of horizontally layered soil are usually obtained based on the measured apparent resistivity under different measurement ...
详细信息
Calculated parameters(soil layer resistivity,soil layer thickness,and the number of soil layers)of horizontally layered soil are usually obtained based on the measured apparent resistivity under different measurement distances,which are significant for the design,operation,and maintenance of grounding *** existing calculation methods of soil parameters are just trying to make the calculation results approach the measurement data,ignoring the relationship among measurement data,the calculated soil parameters,and grounding parameters,which would increase the workload of the *** better balance the distance range of the measurement data and the influence of the calculated horizontally layered soil on grounding parameters,this paper systematically studies the relationship among measured apparent soil resistivity,calculated horizontally layered soil parameters,and grounding *** basic theories of apparent resistivity measurement,soil parameter calculation,and grounding parameter calculation are given,the influence of soil layer thickness on the measured apparent resistivity is studied,and the influence of the calculated soil parameters on the grounding resistance of different grounding models is *** on different scales of grounding grids,the results give a corresponding reference distance range of measured apparent soil ***,this paper can help decrease the workload of soil resistivity measurement during grounding parameters analysis,which has far-reaching engineering significance.
Data envelopment analysis (DEA) is widely used in various fields and for various models. Inverted data envelopment analysis (inverted DEA) is an extended model of DEA. Regression analysis (RA) is a statistical process...
详细信息
Purpose–A cross-domain intelligent software-defined network(SDN)routing method based on a proposed multiagent deep reinforcement learning(MDRL)method is ***/methodology/approach–First,the network is divided into mul...
详细信息
Purpose–A cross-domain intelligent software-defined network(SDN)routing method based on a proposed multiagent deep reinforcement learning(MDRL)method is ***/methodology/approach–First,the network is divided into multiple subdomains managed by multiple local controllers,and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement ***,a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers,and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real ***,after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers,a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real ***–Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first(OSPF)routing methods Originality/value–Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds,coupled with the shortcomings of traditional interdomain routing methods,such as cumbersome configuration and inflexible acquisition of network state *** drawbacks make it difficult to obtain global state information about the network,and the optimal routing decision cannot be made in real time,affecting network *** paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL ***,the network
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,esp...
详细信息
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,especially for users who prefer to remain anonymous,especially on online social networks(OSNs).Moreover,due to the commercialization of online users'data,some service providers sell users'data to third parties at the blind side of the users,which leads to trust issues between users and service *** matters call for a system that gives online users much-needed control and autonomy of their *** the advancement of blockchain technology,many research institutions are experimenting with decentralized technologies to resolve the OSN user dilemma of privacy intrusion against third parties and *** resolve these limitations,we propose RecGuard,a privacy preservation blockchain-based network *** developed two smart contracts,RG-SH and RG-ST,to ensure the security and privacy of user *** RG-SH manages user data,whereas the RGST stores data.A graph convolutional network(GCN)was integrated with the blockchain-based system to detect malicious ***,we implemented our framework prototype on a locally simulated *** analysis and experiment results show that the proposed scheme demonstrates the effectiveness and privacy of users in our framework.
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and c...
详细信息
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and controllability, some researchershave introduced symmetric layouts along with thesetools. One popular strategy employs dynamical systemscompatible with symmetries that construct functionswith the desired symmetries. However, these aretypically confined to simple planar symmetries. Theother generates symmetrical patterns under theconstraints of tilings. Although it is slightly moreflexible, it is restricted to small ranges of tilingsand lacks textural variations. Thus, we proposed anew approach for generating aesthetic patterns bysymmetrizing quasi-regular patterns using general kuniformtilings. We adopted a unified strategy toconstruct invariant mappings for k-uniform tilings thatcan eliminate texture seams across the tiling ***, we constructed three types of symmetriesassociated with the patterns: dihedral, rotational, andreflection symmetries. The proposed method can beeasily implemented using GPU shaders and is highlyefficient and suitable for complicated tiling with regularpolygons. Experiments demonstrated the advantages of our method over state-of-the-art methods in terms offlexibility in controlling the generation of patterns withvarious parameters as well as the diversity of texturesand styles.
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can...
详细信息
Semantic segmentation is an important sub-task for many ***,pixel-level ground-truth labeling is costly,and there is a tendency to overfit to training data,thereby limiting the generalization *** domain adaptation can potentially address these problems by allowing systems trained on labelled datasets from the source domain(including less expensive synthetic domain)to be adapted to a novel target *** conventional approach involves automatic extraction and alignment of the representations of source and target domains *** limitation of this approach is that it tends to neglect the differences between classes:representations of certain classes can be more easily extracted and aligned between the source and target domains than others,limiting the adaptation over all ***,we address:this problem by introducing a Class-Conditional Domain Adaptation(CCDA)*** incorporates a class-conditional multi-scale discriminator and class-conditional losses for both segmentation and ***,they measure the segmentation,shift the domain in a classconditional manner,and equalize the loss over *** results demonstrate that the performance of our CCDA method matches,and in some cases,surpasses that of state-of-the-art methods.
As an important computer vision task that can be used in many areas, facial expression recognition (FER) has been widely studied which much progress has been obtained especially when deep learning (DL) approaches have...
详细信息
暂无评论