The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature...
The automatic evaluation of Chinese character writing quality has a wide application prospect. Most of the existing evaluation methods of Chinese character writing quality are based on radical segmentation and feature judgment, which require the high accuracy of Chinese character segmentation. However, there are many problems in the real handwriting, such as continuous writing, uneven strength of writing, personalized writing style and so on, which lead to the difficulty of segmentation in the ordinary handwriting. To solve the above problems, we propose an effective method based on image texture where the uniformity of writing lines and writing style is taken as an effective criterion. In our method, Gabor transform is used to extract the image features of writing samples, and finally the statistical learning method of support vector machine is used to effectively evaluate the writing quality. Experiments on multiple real datasets including CHAED show that our method is effective and accurate. The advantage of this method is that it does not need to segment fonts, and the cost of global feature extraction is small.
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** there are various types of nodes and interactions in LBSNs,they can be treated as Heterogeneous Information network(HIN) where multiple semantic meta-paths can be *** by the recent success of meta-path context based embedding techniques in HIN,in this paper,we design a deep neural network framework leveraging various meta-path contexts for fine-grained user location *** results based on two real-world LBSN datasets demonstrate the best effectiveness of the proposed approach using various evaluation metrics than others.
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is ge...
详细信息
Most existing approaches of learning to rank treat the effectiveness of each query equally which results in a relatively lower ratio of queries with high effectiveness (i.e. rich queries) in the produced ranking model...
详细信息
Cloud computing attracts users with its advantage of unlimited resource supply where resources can be elastically expanded on demand and balanced-load at the same time. This means that the application in the cloud env...
Cloud computing attracts users with its advantage of unlimited resource supply where resources can be elastically expanded on demand and balanced-load at the same time. This means that the application in the cloud environment should run in the way of elastic expansion cluster. At present, most of the elastic expansion and load balancing technologies provided by IaaS level are oriented to virtual machines (VM), with little consideration of application level, which does not fundamentally meet the needs of users. Based on this, starting from the motivation of cloud migration, we first analyse the cloud migration technology from three aspects: migration object, migration means and migration objectives, then explore the cloud migration criteria and four cloud migration strategies at the application level in the cloud environment, and point out that cloud migration should be optimized and maintained in terms of elastic expansion, load balancing, security, etc.
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w...
详细信息
Nowadays, with the increasing number of protein sequences all over the world, more and more people are paying their attention to predicting protein subcellular location. Since wet experiment is costly and time-consumi...
详细信息
Nowadays, with the increasing number of protein sequences all over the world, more and more people are paying their attention to predicting protein subcellular location. Since wet experiment is costly and time-consuming, the automatic computational methods are urgent. In this paper, we propose a variant model based on Long Short-Term Memory(LSTM) to predict protein subcellular location. In this model, we employ LSTM to capture long distance dependency features of the sequence data. Moreover, we adjust the loss function of the loss layer to solve multi-label classification problem. Experimental results demonstrate that, compared with the traditional machine learning methods, our method achieves the best performance in various evaluation metrics.
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(...
详细信息
Influential user evaluation is great importance in many application areas of online social *** order to identify influential users in a more adequate and practical way, we propose a Dynamic regional interaction model(DRI) to evaluate user influence in online social networks. Influential users can be identified by the influence effect on different distance users based on dynamic regional interaction model. We have applied the influential user identification method to Sina Weibo and the experimental results show that compared with the existing methods the proposed method can identify the influence users in a more accuracy and efficiency way.
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label cl...
详细信息
Recent years conventional neural network(CNN) has been applied to different natural language processing(NLP) tasks such as sentence classification, sentence modeling, etc. Some researchers use CNN to do multi-label classification but their work mainly focus on image rather than text. In this paper, we propose an improved CNN via hierarchical dirichlet process(HDP) model to deal with the multi-label classification problem in NLP. We first apply an HDP model to discard some words which are less important semantically. Then we use word embedding methods to transform words to vectors. Finally, we train CNN based on word vectors. Experimental results demonstrate that our method is superior to most traditional multi-label classification methods and TextCNN in terms of performance.
Internet worms can propagate across networks at terrifying speeds, reduce networksecurity to a remarkable extent, and cause heavy economic losses. Thus, the rapid elimination of Internet worms using partial immunizat...
Internet worms can propagate across networks at terrifying speeds, reduce networksecurity to a remarkable extent, and cause heavy economic losses. Thus, the rapid elimination of Internet worms using partial immunization becomes a significant matter for sustaining Internet infrastructure. This paper addresses this issue by presenting a novel worm susceptible-vaccinated-exposed-infectious-recovered model, named the SVEIR model. The SVEIR model extends the classical susceptible-exposed-infectious-recovered model (refer to SEIR model) through incorporating a saturated incidence rate and a partial immunization rate. The basic reproduction number in the SVEIR model is obtained. By virtue of the basic reproduction number, we prove the global stabilities of an infection-free equilibrium point and a unique endemic equilibrium point. Numerical methods are used to verify the proposed SVEIR model. Simulation results show that partial immunization is highly effective for eliminating worms, and the SVEIR model is viable for controlling and forecasting Internet worms.
暂无评论