-
15281
Encoding Cryptic Crossword Clues with TEI
Published 2019-08-01“…Finally, I present a TEI schema and an approach to encoding the components of cryptic crossword clues in a way that enables algorithmic analysis of trends, features, and clue types, with a view to creating a historical corpus of encoded clues which will illuminate the evolution of the tradition.…”
Get full text
Article -
15282
CYBERPUNK – GAME – POETRY: Rostislav Amelin’s “SimStab”
Published 2024-10-01“…Thus, in “SimStab” the ludic algorithmic with its procedural rhetoric (Ian Bogost) creates spaces of formlessness which repeats the liberatory promise of cyberpunk literature. …”
Get full text
Article -
15283
Trajectory privacy protection scheme based on differential privacy
Published 2021-09-01“…To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sampling model based on time generalization and spatial segmentation was presented, and a k-means clustering algorithm was designed to process sampling data.By employing the differential privacy mechanism, the trajectory data was disturbed to solve the user privacy leaking problem caused by the attacker with powerful background knowledge.Simultaneously, to respond to the error boundary of the query range of pandemic, an effective prediction mechanism was designed to ensure the availability of released public track data.Simulation results demonstrate that compared with the existing trajectory differential privacy protection methods, the proposed scheme has obvious advantages in terms of processing efficiency, privacy protection intensity, and data availability.…”
Get full text
Article -
15284
A Review of Bias and Fairness in Artificial Intelligence
Published 2025-01-01“…As a result, a new field of research on algorithmic fairness has emerged. In this area, detecting biases and mitigating them is essential to ensure fair and discrimination-free decisions. …”
Get full text
Article -
15285
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
15286
Segmentation of Activated Sludge Flocs in Microscopic Images for Monitoring Wastewater Treatment
Published 2022-01-01“…To address this challenge, we propose a novel framework involving a multiphase edge detection algorithm based on information theory. The proposed framework is evaluated and scrutinized critically considering the artifacts found in the photographs tested. …”
Get full text
Article -
15287
Iterative joint source channel decoding for WMSN
Published 2008-01-01“…An iterative joint source channel decoding (ISCD) scheme for WMSN is proposed, based on a soft-input-soft-output (SISO) a posteriori probability decoding algorithm for variable-length coded sources, which leads to not only maximum likelihood (ML) sequence estimation but also the computation of bit-based reliability values which are necessary for ISCD. …”
Get full text
Article -
15288
Low-hit frequency-hopping communication systems for power Internet of things random access
Published 2023-01-01“…The communication network is an essential component of the data acquisition and information transmission in power Internet of things (IoT).To meet the development requirements of multiple power service in the future, the wireless communication technique with flexible-access and high scalability is one of the development directions for power IoT.Due to the features of large-scale access, random access time, high security and reliability for information transmission of power IoT, a frequency-hopping (FH) technique with low-hit rate for random access was proposed.The construction algorithm of such FH pattern was based upon the combination and shift operation of conventional FH sequences.By the theoretical arithmetic and numerical simulation, the properties of the proposed FH pattern and the error-rate of the FH-based power IoT were evaluated.The analysis reveals that the new class of FH sequences and the system can meet the requirements of large-scale access and highly reliable communication for the power IoT, which has good application prospects.…”
Get full text
Article -
15289
Preconditioning Filter Bank Decomposition Using Structured Normalized Tight Frames
Published 2015-01-01“…We start with a given generalized frame whose elements allow for fast matrix vector multiplication, as, for instance, convolution operators, and compute a normalized tight frame, for which signal analysis and synthesis still preserve those fast algorithmic schemes.…”
Get full text
Article -
15290
Analysis and Parameter Optimum of a New 4-DOF 4PPaRR Parallel Mechanism
Published 2019-07-01“…Then a performance index is defined in order to analyze the rotational capacity of 4PPaRR parallel mechanism, The scale optimization of parallel mechanism size is carried out based on Grasshopper Optimization Algorithm(GOA)in the end. The research results show that the 4PPaRR parallel mechanism has larger workspace and rotation capability. …”
Get full text
Article -
15291
On the Principles and Decisions of New Word Translation in Sino-Japan Cross-Border e-Commerce: A Study in the Context of Cross-Cultural Communication
Published 2023-01-01“…The results show that the algorithm in this paper achieves the best performance on both the BLEU and METEOR evaluation metrics.…”
Get full text
Article -
15292
Routing approach based on local topology control in cognitive radio networks
Published 2016-05-01“…An approach of topology control and routing was proposed according to the characteristics of cogni ive radio networks,which considered multi factors optimization with fusion of primary users and secondary users.And the ap-proach took the spectrum utilization of primary users the interference from secondary users to primary users into ac-count.Then a joint link cost was defined combining the predicted cognitive link stability with the link power consump-tion.Furthermore,the local cognitive topology control routing(LCTCR)algorithm with minimizing the link cost was presented,which was used to optimize the network topology.Meanwhile,the network path was selected according to the optimized network topology.Theoretical analysis and simulation experiments show that the link power consumption and the link stability are also important parameters and need to be jointly optimized when selecting the network path.Only by doing so can it guarantee that the selected path is optimal.…”
Get full text
Article -
15293
Substructure correlation adaptation transfer learning method based on K-means clustering
Published 2023-03-01“…Domain drifts severely affect the performance of traditional machine learning methods, and existing domain adaptive methods are mainly represented by adaptive adjustment cross-domain through global, class-level, or sample-level distribution adaptation.However, too coarse global matching and class-level matching can lead to insufficient adaptation, and sample-level adaptation to noise can lead to excessive adaptation.A substructure correlation adaptation (SCOAD) transfer learning algorithm based on K-means clustering was proposed.Firstly, multiple subdomains of the source domain and the target domain were obtained by K-means clustering.Then, the matching of the second-order statistics of the subdomain center was sought.Finally, the target domain samples were classified by using the subdomain structure.The proposed method approach further improves the performance of knowledge transfer between the source and target domains on top of the traditional approach.Experimental results on common transfer learning datasets show the effectiveness of the proposed method.…”
Get full text
Article -
15294
Realistic challenges and path options for the high-quality development of smart stadiums in China
Published 2025-01-01“…The study finds that the problems of high-quality construction of smart stadiums in China include: information technology treats the masses as a tame object and a test object for the safety valve, there is a paradox between algorithmic "de-deviation" and "personalised" sports services, and there is a lack of product standards and construction standards for smart stadium facilities. …”
Get full text
Article -
15295
Using deep learning for detecting BotCloud
Published 2016-11-01“…Finally, in order to detect BotCloud, it utilized CNN algorithm to learn and extract characteristics that were more abstract to express the hidden model and structural relationship in the network data flow. …”
Get full text
Article -
15296
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01“…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
Get full text
Article -
15297
Innovation of Teaching Method of Digital Media Art Based on Convolutional Neural Network
Published 2022-01-01“…In order to improve the effect of digital media art teaching, this study combines the neural network algorithm to carry out the innovation of digital media art teaching resource management and teaching method innovation. …”
Get full text
Article -
15298
Research on Design and Application of National Fitness System
Published 2021-01-01“…On this basis, through the collection of users’ fitness data rating data, the data are transformed into fitness data rating matrix, and the matrix is analyzed and calculated to realize the intelligent recommendation of fitness data and complete the design of national fitness data recommendation algorithm. The test results show that the system can meet the requirements of normal use, good compatibility, and user score is high and has high practical application value.…”
Get full text
Article -
15299
Analysis of MIMO antenna array based on electromagnetic vector sensor
Published 2013-05-01“…EVS(electromagnetic vetor sensor) signal processing method was combined with traditional MIMO signal processing method and three-dimensional channel model of multi-antenna array was set up.The algorithm of multiple signal classification (MUSIC) was adopted to make spatial spectrum estimation for direction of arrival (DOA) signal,analytical expressions of three-dimensional spatial channel was derived base on EVS for MIMO receiver system and the relationship between EVS signal processing and MIMO multipath channel correlation was clarified.To compare with tra-ditional MIMO antenna array,EVS array possesses abilities of obtaining multidimensional polarization information,processing spatial and polarization domain for arrival signal and degrading effects of spatial factors on MIMO channel capacity.Theoretical analysis and simulation results indicate that EVS array provide more advantages than traditional scalar sensor array on enhancing MIMO system performance.…”
Get full text
Article -
15300
Research on verification of behavior requirement patterns based on action sequences
Published 2011-01-01“…Function behavior requirements(FBR) and safety behavior requirements(SBR) were described by action se-quences.Compared with the traditional logic or graphic form,action sequences can express the temporal relationship among interactive behaviors more exactly.Moreover,FBR pattern and SBR pattern are constructed by action sequences,and the operation semantics of these patterns are also given.To implement the requirement verification based on behavior patterns,the necessary and sufficient conditions as well as the checking algorithm for the satisfiability of FBR pattern and SBR pattern are presented and proven by redefining the property expression and combination operation of LTS’s safety and liveness.The framework has been widely applied in the formal verification & validation of component-based CTCS2/3 systems,and has shown great theoretical and practical significance to combinational verification of Compo-nent-based safety-critical systems.…”
Get full text
Article