Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    PROCEEDINGS

    High-Resolution Flow Field Reconstruction Based on Graph-Embedding Neural Network

    Weixin Jiang1,*, Zongze Li2, Qing Yuan3,*, Junhua Gong2, Bo Yu4

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.1, pp. 1-3, 2024, DOI:10.32604/icces.2024.011266

    Abstract High resolution flow field results are of great significance for exploring physical laws and guiding practical engineering practice. However, traditional activities based on experiments or direct numerical solutions to obtain high-resolution flow fields typically require a significant amount of computational time or resources. In response to this challenge, this study proposes an efficient and robust high-resolution flow field reconstruction method by embedding graph theory into neural networks, to adapt to low data volume situations. In the high resolution flow field reconstruction problem of an NS equation, the proposed model has a lower mean squared error More >

  • Open Access

    ARTICLE

    Binary Program Vulnerability Mining Based on Neural Network

    Zhenhui Li1, Shuangping Xing1, Lin Yu1, Huiping Li1, Fan Zhou1, Guangqiang Yin1, Xikai Tang2, Zhiguo Wang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1861-1879, 2024, DOI:10.32604/cmc.2023.046595 - 27 February 2024

    Abstract Software security analysts typically only have access to the executable program and cannot directly access the source code of the program. This poses significant challenges to security analysis. While it is crucial to identify vulnerabilities in such non-source code programs, there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods. However, these tools suffer from some shortcomings. In terms of targeted fuzzing, the path searching for target points is not streamlined enough, and the completely random testing leads to an excessively large search space. Additionally, when it… More >

  • Open Access

    ARTICLE

    Graph-Based Feature Learning for Cross-Project Software Defect Prediction

    Ahmed Abdu1, Zhengjun Zhai1,2, Hakim A. Abdo3, Redhwan Algabri4,*, Sungon Lee5,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 161-180, 2023, DOI:10.32604/cmc.2023.043680 - 31 October 2023

    Abstract Cross-project software defect prediction (CPDP) aims to enhance defect prediction in target projects with limited or no historical data by leveraging information from related source projects. The existing CPDP approaches rely on static metrics or dynamic syntactic features, which have shown limited effectiveness in CPDP due to their inability to capture higher-level system properties, such as complex design patterns, relationships between multiple functions, and dependencies in different software projects, that are important for CPDP. This paper introduces a novel approach, a graph-based feature learning model for CPDP (GB-CPDP), that utilizes NetworkX to extract features and… More >

  • Open Access

    ARTICLE

    Knowledge Graph Representation Learning Based on Automatic Network Search for Link Prediction

    Zefeng Gu, Hua Chen*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2497-2514, 2023, DOI:10.32604/cmes.2023.024332 - 23 November 2022

    Abstract Link prediction, also known as Knowledge Graph Completion (KGC), is the common task in Knowledge Graphs (KGs) to predict missing connections between entities. Most existing methods focus on designing shallow, scalable models, which have less expressive than deep, multi-layer models. Furthermore, most operations like addition, matrix multiplications or factorization are handcrafted based on a few known relation patterns in several well-known datasets, such as FB15k, WN18, etc. However, due to the diversity and complex nature of real-world data distribution, it is inherently difficult to preset all latent patterns. To address this issue, we propose KGE-ANS, More >

  • Open Access

    ARTICLE

    Future Event Prediction Based on Temporal Knowledge Graph Embedding

    Zhipeng Li1,2, Shanshan Feng3,*, Jun Shi2, Yang Zhou2, Yong Liao1,2, Yangzhao Yang2, Yangyang Li4, Nenghai Yu1, Xun Shao5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2411-2423, 2023, DOI:10.32604/csse.2023.026823 - 01 August 2022

    Abstract Accurate prediction of future events brings great benefits and reduces losses for society in many domains, such as civil unrest, pandemics, and crimes. Knowledge graph is a general language for describing and modeling complex systems. Different types of events continually occur, which are often related to historical and concurrent events. In this paper, we formalize the future event prediction as a temporal knowledge graph reasoning problem. Most existing studies either conduct reasoning on static knowledge graphs or assume knowledges graphs of all timestamps are available during the training process. As a result, they cannot effectively… More >

  • Open Access

    ARTICLE

    DeepWalk Based Influence Maximization (DWIM): Influence Maximization Using Deep Learning

    Sonia1, Kapil Sharma1,*, Monika Bajaj2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1087-1101, 2023, DOI:10.32604/iasc.2023.026134 - 06 June 2022

    Abstract Big Data and artificial intelligence are used to transform businesses. Social networking sites have given a new dimension to online data. Social media platforms help gather massive amounts of data to reach a wide variety of customers using influence maximization technique for innovative ideas, products and services. This paper aims to develop a deep learning method that can identify the influential users in a network. This method combines the various aspects of a user into a single graph. In a social network, the most influential user is the most trusted user. These significant users are… More >

  • Open Access

    ARTICLE

    Multiple Object Tracking through Background Learning

    Deependra Sharma*, Zainul Abdin Jaffery

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 191-204, 2023, DOI:10.32604/csse.2023.023728 - 01 June 2022

    Abstract This paper discusses about the new approach of multiple object tracking relative to background information. The concept of multiple object tracking through background learning is based upon the theory of relativity, that involves a frame of reference in spatial domain to localize and/or track any object. The field of multiple object tracking has seen a lot of research, but researchers have considered the background as redundant. However, in object tracking, the background plays a vital role and leads to definite improvement in the overall process of tracking. In the present work an algorithm is proposed More >

  • Open Access

    ARTICLE

    Fusion Recommendation System Based on Collaborative Filtering and Knowledge Graph

    Donglei Lu1, Dongjie Zhu2,*, Haiwen Du3, Yundong Sun3, Yansong Wang2, Xiaofang Li4, Rongning Qu4, Ning Cao1, Russell Higgs5

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1133-1146, 2022, DOI:10.32604/csse.2022.021525 - 08 February 2022

    Abstract The recommendation algorithm based on collaborative filtering is currently the most successful recommendation method. It recommends items to the user based on the known historical interaction data of the target user. Furthermore, the combination of the recommended algorithm based on collaborative filtration and other auxiliary knowledge base is an effective way to improve the performance of the recommended system, of which the Co-Factorization Model (CoFM) is one representative research. CoFM, a fusion recommendation model combining the collaborative filtering model FM and the graph embedding model TransE, introduces the information of many entities and their relations in the… More >

Displaying 1-10 on page 1 of 8. Per Page