Advanced Search
Displaying 7421-7430 on page 743 of 7873. Per Page  
  • Sentiment Classification Based on Piecewise Pooling Convolutional Neural Network
  • Abstract Recently, the effectiveness of neural networks, especially convolutional neural networks, has been validated in the field of natural language processing, in which, sentiment classification for online reviews is an important and challenging task. Existing convolutional neural networks extract important features of sentences without local features or the feature sequence. Thus, these models do not perform well, especially for transition sentences. To this end, we propose a Piecewise Pooling Convolutional Neural Network (PPCNN) for sentiment classification. Firstly, with a sentence presented by word vectors, convolution operation is introduced to obtain the convolution feature map vectors. Secondly, these vectors are segmented according…
  • More
  •   Views:291       Downloads:146        Download PDF
  • Automatic Mining of Security-Sensitive Functions from Source Code
  • Abstract When dealing with the large-scale program, many automatic vulnerability mining techniques encounter such problems as path explosion, state explosion, and low efficiency. Decomposition of large-scale programs based on safety-sensitive functions helps solve the above problems. And manual identification of security-sensitive functions is a tedious task, especially for the large-scale program. This study proposes a method to mine security-sensitive functions the arguments of which need to be checked before they are called. Two argument-checking identification algorithms are proposed based on the analysis of two implementations of argument checking. Based on these algorithms, security-sensitive functions are detected based on the ratio of…
  • More
  •   Views:313       Downloads:140        Download PDF
  • Full-Blind Delegating Private Quantum Computation
  • Abstract The delegating private quantum computation (DQC) protocol with the universal quantum gate set {X,Z,H,P,R,CNOT} was firstly proposed by Broadbent et al. [Broadbent (2015)], and then Tan et al. [Tan and Zhou (2017)] tried to put forward a half-blind DQC protocol (HDQC) with another universal set {H,P,CNOT,T}. However, the decryption circuit of Toffoli gate (i.e. T) is a little redundant, and Tan et al.’s protocol [Tan and Zhou (2017)] exists the information leak. In addition, both of these two protocols just focus on the blindness of data (i.e. the client’s input and output), but do not consider the blindness of computation…
  • More
  •   Views:269       Downloads:153        Download PDF
  • Biodegradation of Medicinal Plants Waste in an Anaerobic Digestion Reactor for Biogas Production
  • Abstract Glycyrrhiza glabra, Mint, Cuminum cyminum, Lavender and Arctium medicinal are considered as edible plants with therapeutic properties and as medicinal plants in Iran. After extraction process of medicinal plants, residual wastes are not suitable for animal feed and are considered as waste and as an environmental threat. At present there is no proper management of waste of these plants and they are burned or buried. The present study discusses the possibility of biogas production from Glycyrrhiza Glabra Waste (GGW), Mentha Waste (MW), Cuminum Cyminum Waste (CCW), Lavender Waste (LW) and Arctium Waste (AW). 250 g of these plants with TS…
  • More
  •   Views:296       Downloads:194        Download PDF
  • Coverless Steganography for Digital Images Based on a Generative Model
  • Abstract In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image.…
  • More
  •   Views:294       Downloads:146        Download PDF
  • On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing
  • Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted…
  • More
  •   Views:345       Downloads:151        Download PDF
  • Molecular Structure and Electronic Spectra of CoS under the Radiation Fields
  • Abstract We optimized the ground-state stable configuration of CoS molecule in different external radiation fields (0-0.04 atomic units (a.u.)) at the basis set level of 6-311G++ (d, p) using the B3LYP density functional theory. On this basis, the molecular structure, total energy, energy gap, and the intensities of infrared ray (IR) spectra, Raman spectra, and ultraviolet-visible (UV-Vis) absorption spectra of CoS molecule were computed using the same method. The results showed that the molecular structure changed greatly under the effect of the external radiation fields and had significant dependency on the radiation fields. The total energy of CoS molecule grew slightly…
  • More
  •   Views:266       Downloads:166        Download PDF
  • Real-Time Visual Tracking with Compact Shape and Color Feature
  • Abstract The colour feature is often used in the object tracking. The tracking methods extract the colour features of the object and the background, and distinguish them by a classifier. However, these existing methods simply use the colour information of the target pixels and do not consider the shape feature of the target, so that the description capability of the feature is weak. Moreover, incorporating shape information often leads to large feature dimension, which is not conducive to real-time object tracking. Recently, the emergence of visual tracking methods based on deep learning has also greatly increased the demand for computing resources…
  • More
  •   Views:314       Downloads:169        Download PDF
  • Inverted XML Access Control Model Based on Ontology Semantic Dependency
  • Abstract In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature of XML data, this paper…
  • More
  •   Views:260       Downloads:186        Download PDF
  • A Spark Scheduling Strategy for Heterogeneous Cluster
  • Abstract As a main distributed computing system, Spark has been used to solve problems with more and more complex tasks. However, the native scheduling strategy of Spark assumes it works on a homogenized cluster, which is not so effective when it comes to heterogeneous cluster. The aim of this study is looking for a more effective strategy to schedule tasks and adding it to the source code of Spark. After investigating Spark scheduling principles and mechanisms, we developed a stratifying algorithm and a node scheduling algorithm is proposed in this paper to optimize the native scheduling strategy of Spark. In this…
  • More
  •   Views:273       Downloads:241        Download PDF
Displaying 7421-7430 on page 743 of 7873. Per Page