首页 > 最新文献

Recent Advances in Computer Science and Communications最新文献

英文 中文
Patent Selections 专利的选择
Q3 Computer Science Pub Date : 2023-10-01 DOI: 10.2174/266625581608231012101755
{"title":"Patent Selections","authors":"","doi":"10.2174/266625581608231012101755","DOIUrl":"https://doi.org/10.2174/266625581608231012101755","url":null,"abstract":"","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135762450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Width Calculation of Tiny Bridge Cracks Based on Unmanned Aerial Vehicle Images 基于无人机图像的桥梁微裂缝宽度计算
Q3 Computer Science Pub Date : 2023-09-14 DOI: 10.2174/2666255816666230914085830
Yong Lan, Shaoxiong Huang, Zhenlong Wang, Yong Pan, Yan Zhao, Jianjun Sun
Introduction: Crack is the main bridge disease. The monitoring of the crack width is the key for determining whether the bridge needs to be maintained. The systematic and automatic detection of bridge cracks can be realized using the crack images, which are captured using unmanned aerial vehicles (UAV). Methods: Cracks in the image with a complex background and low contrast ratio are difficult to detect. In order to detect the tiny cracks, the image is preprocessed by homomorphic filtering to enhance the contrast ratio. It is a necessary step that makes the color clustering be used in the detection. An adaptive color clustering method is proposed to detect cracks without additional initialization. Morphological method is also used to obtain clean edges and skeletons. Results: The proposed method can accurately detect the crack areas with an actual width greater than 0.13 mm, and the absolute error is only 0.0013 mm. The relative error for all test images are smaller than 15.6%. Cracks over 0.2 mm need to be filled. Therefore, this error is completely acceptable in practice. Discussion: The proposed method is practical and reproducible for bridge disease automatic inspection based on UAV. In order to verify its advantage, the proposed method is compared with a state-of-the-art method, which is published on Sensors. The proposed method is proven to be better for images with water stains in its complex background. Conclusion: The proposed method can calculate the width of tiny cracks accurately, even if the width is below 0.2 mm.
简介:裂缝是桥梁的主要病害。裂缝宽度的监测是决定桥梁是否需要维修的关键。利用无人机捕获的裂缝图像,可以实现桥梁裂缝的系统自动检测。方法:在背景复杂、对比度低的情况下,难以检测出图像中的裂纹。为了检测微小裂纹,对图像进行同态滤波预处理,提高对比度。这是使颜色聚类在检测中得以应用的必要步骤。提出了一种无需初始化的自适应颜色聚类方法。形态学方法也用于获得干净的边缘和骨架。结果:所提出的方法能够准确检测出实际宽度大于0.13 mm的裂纹区域,绝对误差仅为0.0013 mm。所有测试图像的相对误差均小于15.6%。大于0.2 mm的裂缝需要填充。因此,这个错误在实践中是完全可以接受的。讨论:提出的方法在基于无人机的桥梁病害自动检测中具有实用性和可重复性。为了验证其优势,将该方法与发表在《传感器》杂志上的一种最新方法进行了比较。实验证明,该方法对复杂背景下带有水渍的图像具有较好的检测效果。结论:该方法可以准确地计算出微裂纹的宽度,即使宽度小于0.2 mm。
{"title":"Width Calculation of Tiny Bridge Cracks Based on Unmanned Aerial Vehicle Images","authors":"Yong Lan, Shaoxiong Huang, Zhenlong Wang, Yong Pan, Yan Zhao, Jianjun Sun","doi":"10.2174/2666255816666230914085830","DOIUrl":"https://doi.org/10.2174/2666255816666230914085830","url":null,"abstract":"Introduction: Crack is the main bridge disease. The monitoring of the crack width is the key for determining whether the bridge needs to be maintained. The systematic and automatic detection of bridge cracks can be realized using the crack images, which are captured using unmanned aerial vehicles (UAV). Methods: Cracks in the image with a complex background and low contrast ratio are difficult to detect. In order to detect the tiny cracks, the image is preprocessed by homomorphic filtering to enhance the contrast ratio. It is a necessary step that makes the color clustering be used in the detection. An adaptive color clustering method is proposed to detect cracks without additional initialization. Morphological method is also used to obtain clean edges and skeletons. Results: The proposed method can accurately detect the crack areas with an actual width greater than 0.13 mm, and the absolute error is only 0.0013 mm. The relative error for all test images are smaller than 15.6%. Cracks over 0.2 mm need to be filled. Therefore, this error is completely acceptable in practice. Discussion: The proposed method is practical and reproducible for bridge disease automatic inspection based on UAV. In order to verify its advantage, the proposed method is compared with a state-of-the-art method, which is published on Sensors. The proposed method is proven to be better for images with water stains in its complex background. Conclusion: The proposed method can calculate the width of tiny cracks accurately, even if the width is below 0.2 mm.","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134972979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-based Smart Pill Reminding System 基于物联网的智能药丸提醒系统
Q3 Computer Science Pub Date : 2023-09-11 DOI: 10.2174/2666255816666230911151545
Akul Nagchandi, Pradyot Kher, Abhishek Gudipalli, Amit Tiwari
Background: The concept of pill reminders has been discussed and developed throughout the decade. It varies from cascaded plastic pill boxes to complicated robust dispensers. This proposed smart pill reminding system based on IoT is being designed by considering ease-to-use and cost-effectiveness. Method: A smart pill reminding system is a system that will alert the patient to take their respective pill at the desired time. It will also track the motion of the patient’s hand while taking the pill and will also display the pill count on an LCD Screen. In case a patient forgets/ignores the reminder provided by the system, the system will automatically display the status on the application that will be installed in the relative/caretaker’s phone and through an email on the patient's relative/caretaker’s email address to take subsequent action. The system will monitor the real-time using an RTC module, and as and when the current time matches the medicines time, it will activate its mechanism, and the patient will have a buffer time to take their medicine. In case a patient does take the medicine in the buffer time provided by the system, then one mechanism of the system will be activated. In another case, if a patient does not take the medicine in the stipulated time, further actions will be initiated by the system to benefit the patient. Results: It was tested and found that out of ten times, the system worked accurately nine times, with calculated accuracy as high as 90%. Initially, the Blynk application will display “Welcome Patient” and “You will be updated”. Once the RTC matches the scheduled time to take medicine, the buzzer starts buzzing. If the IR sensor detects the movement of the user’s hand, the LCD will update the pill count, and the pill count is reduced by one. The LCD will also display the message “Medicine Taken”. If the IR sensor does not detect the movement of the user’s hand, the LCD will display the same pill count. The LCD will also display the message “Med1 not Taken”. The Blynk will also be updated and will display the same messages. The green LED shows the status of the consumption of the pill. The email will sent to the caretaker in this case. Conclusion: In this work, all the problems related to the system are overcome in a systematic manner with the help of IoT and basic electronic applications. Thus, the system will help the user take all the prescribed medicines on time and will also update the user’s caretaker via application and email services. This will largely help the working class as well as the senior citizens. Thus, this proposed system can be commercialised as a handy and cost-effective device.
背景:在过去的十年中,药丸提醒器的概念一直在讨论和发展。它从层叠的塑料药盒到复杂的坚固的分配器不一而足。以物联网为基础的智能药丸提醒系统是考虑到易用性和成本效益而设计的。方法:智能药丸提醒系统是一个系统,将提醒患者服用各自的药丸在所需的时间。它还会在服药时跟踪病人的手部动作,并在液晶屏幕上显示药丸数量。如果患者忘记/忽略系统提供的提醒,系统将自动在安装在亲属/看护人手机中的应用程序上显示状态,并通过患者亲属/看护人的电子邮件地址发送电子邮件,以便采取后续行动。系统将使用RTC模块进行实时监控,当当前时间与服药时间匹配时,系统将启动其机制,患者将有一个缓冲时间来服药。如果患者在系统提供的缓冲时间内服药,则系统的一个机制将被激活。在另一种情况下,如果患者没有在规定的时间内服药,系统将启动进一步的行动,使患者受益。结果:经测试,系统10次中有9次工作准确,计算精度高达90%。最初,Blynk应用程序将显示“欢迎患者”和“您将更新”。一旦RTC达到预定的服药时间,蜂鸣器就会开始嗡嗡作响。如果红外传感器检测到用户的手的运动,LCD将更新药丸计数,药丸计数减少一个。LCD也会显示“服药”的信息。如果红外传感器没有检测到用户的手的运动,LCD将显示相同的药丸数。液晶屏也会显示“Med1未拍摄”的信息。Blynk也将更新,并将显示相同的消息。绿色LED显示药丸的消耗状态。在这种情况下,电子邮件将发送给管理员。结论:在本工作中,借助物联网和基础电子应用,系统地解决了系统相关的所有问题。因此,该系统将帮助用户按时服用所有处方药物,并通过应用程序和电子邮件服务更新用户的看护人。这将在很大程度上帮助工人阶级和老年人。因此,该系统可以作为一种方便且具有成本效益的设备商业化。
{"title":"IoT-based Smart Pill Reminding System","authors":"Akul Nagchandi, Pradyot Kher, Abhishek Gudipalli, Amit Tiwari","doi":"10.2174/2666255816666230911151545","DOIUrl":"https://doi.org/10.2174/2666255816666230911151545","url":null,"abstract":"Background: The concept of pill reminders has been discussed and developed throughout the decade. It varies from cascaded plastic pill boxes to complicated robust dispensers. This proposed smart pill reminding system based on IoT is being designed by considering ease-to-use and cost-effectiveness. Method: A smart pill reminding system is a system that will alert the patient to take their respective pill at the desired time. It will also track the motion of the patient’s hand while taking the pill and will also display the pill count on an LCD Screen. In case a patient forgets/ignores the reminder provided by the system, the system will automatically display the status on the application that will be installed in the relative/caretaker’s phone and through an email on the patient's relative/caretaker’s email address to take subsequent action. The system will monitor the real-time using an RTC module, and as and when the current time matches the medicines time, it will activate its mechanism, and the patient will have a buffer time to take their medicine. In case a patient does take the medicine in the buffer time provided by the system, then one mechanism of the system will be activated. In another case, if a patient does not take the medicine in the stipulated time, further actions will be initiated by the system to benefit the patient. Results: It was tested and found that out of ten times, the system worked accurately nine times, with calculated accuracy as high as 90%. Initially, the Blynk application will display “Welcome Patient” and “You will be updated”. Once the RTC matches the scheduled time to take medicine, the buzzer starts buzzing. If the IR sensor detects the movement of the user’s hand, the LCD will update the pill count, and the pill count is reduced by one. The LCD will also display the message “Medicine Taken”. If the IR sensor does not detect the movement of the user’s hand, the LCD will display the same pill count. The LCD will also display the message “Med1 not Taken”. The Blynk will also be updated and will display the same messages. The green LED shows the status of the consumption of the pill. The email will sent to the caretaker in this case. Conclusion: In this work, all the problems related to the system are overcome in a systematic manner with the help of IoT and basic electronic applications. Thus, the system will help the user take all the prescribed medicines on time and will also update the user’s caretaker via application and email services. This will largely help the working class as well as the senior citizens. Thus, this proposed system can be commercialised as a handy and cost-effective device.","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136023994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Roles Based on User Dynamic Operation Logs 基于用户动态操作日志的角色挖掘
Q3 Computer Science Pub Date : 2023-09-08 DOI: 10.2174/2666255816666230901145310
Xiaopu Ma, Qinglei Qi, Li Zhao, Fei Ning, He Li
If we rely solely on whether to assign permissions together to determine roles, the roles we generate may not necessarily reflect the needs of the system. Therefore, the role generation process can be done based on user-to-permission dynamic relationships, such as user dynamic operation logs, thus providing the motivation for this work.In our paper, we introduce a special generalization process and a frequent set-based analysis method to generate roles based on the particular data type of user dynamic operation logs so that the time factor of permissions used is considered before the process of role generation to generate the roles such also as auth_perms(r)={p_1,p_2,p_3}.Our algorithm is less time consuming and generates less roles than traditional algorithm. Furthermore, the roles generated by the algorithm can better describe the real needs of the system and have better interpretability.The results show that the algorithm has superior performance and useful role generation compared to traditional algorithm.
如果我们只依赖于是否一起分配权限来确定角色,那么我们生成的角色可能不一定反映系统的需求。因此,角色生成过程可以基于用户到权限的动态关系来完成,例如用户动态操作日志,从而为这项工作提供动力。在本文中,我们介绍了一种特殊的泛化过程和一种基于频繁集的分析方法,以根据用户动态操作日志的特定数据类型生成角色,从而在生成角色之前考虑使用的权限的时间因素,例如auth_perms(r)={p1,p_2,p_3}。与传统算法相比,我们的算法耗时更少,生成的角色更少。此外,算法生成的角色可以更好地描述系统的真实需求,并具有更好的可解释性。结果表明,与传统算法相比,该算法具有优越的性能和有用的角色生成功能。
{"title":"Mining Roles Based on User Dynamic Operation Logs","authors":"Xiaopu Ma, Qinglei Qi, Li Zhao, Fei Ning, He Li","doi":"10.2174/2666255816666230901145310","DOIUrl":"https://doi.org/10.2174/2666255816666230901145310","url":null,"abstract":"\u0000\u0000If we rely solely on whether to assign permissions together to determine roles, the roles we generate may not necessarily reflect the needs of the system. Therefore, the role generation process can be done based on user-to-permission dynamic relationships, such as user dynamic operation logs, thus providing the motivation for this work.\u0000\u0000\u0000\u0000In our paper, we introduce a special generalization process and a frequent set-based analysis method to generate roles based on the particular data type of user dynamic operation logs so that the time factor of permissions used is considered before the process of role generation to generate the roles such also as auth_perms(r)={p_1,p_2,p_3}.\u0000\u0000\u0000\u0000Our algorithm is less time consuming and generates less roles than traditional algorithm. Furthermore, the roles generated by the algorithm can better describe the real needs of the system and have better interpretability.\u0000\u0000\u0000\u0000The results show that the algorithm has superior performance and useful role generation compared to traditional algorithm.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44993298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patent Selections 专利的选择
Q3 Computer Science Pub Date : 2023-09-01 DOI: 10.2174/266625581607231012095121
{"title":"Patent Selections","authors":"","doi":"10.2174/266625581607231012095121","DOIUrl":"https://doi.org/10.2174/266625581607231012095121","url":null,"abstract":"","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135691622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Model to Detect Fake News About Covid-19 一种检测新冠肺炎虚假新闻的深度学习模型
Q3 Computer Science Pub Date : 2023-08-25 DOI: 10.2174/2666255816666230825100307
S. S. Birunda, R. Kanniga Devi, M. Muthukannan
Twitter has rapidly become a go-to source for current events coverage. The more people rely on it, the more important it is to provide accurate data. Twitter makes it easy to spread misinformation, which can have a significant impact on how people feel, especially if false information spreads around COVID-19.Unfortunately, twitter was also used to spread myths and misinformation about the illness and its preventative immunization. So, it is crucial to identify false information before its spread gets out of hand. In this research, we look into the efficacy of several different types of deep neural networks in automatically classifying and identifying fake news content posted on social media platforms in relation to the COVID-19 pandemic. These networks include long short-term memory (LSTM), bi-directional LSTM, convolutional-neural-networks (CNN), and a hybrid of CNN-LSTM networks.The "COVID-19 Fake News" dataset includes 42,280, actual and fake news cases for the COVID-19 pandemic and associated vaccines and has been used to train and test these deep neural networks.The proposed models are executed and compared to other deep neural networks, the CNN model was found to have the highest accuracy at 95.6%.
推特已经迅速成为时事报道的热门来源。人们对它的依赖程度越高,提供准确数据就越重要。推特很容易传播错误信息,这可能会对人们的感受产生重大影响,尤其是在新冠肺炎周围传播虚假信息的情况下。不幸的是,推特还被用来传播有关该疾病及其预防性免疫接种的神话和错误信息。因此,在虚假信息传播失控之前,识别虚假信息至关重要。在这项研究中,我们研究了几种不同类型的深度神经网络在自动分类和识别社交媒体平台上发布的与新冠肺炎大流行有关的假新闻内容方面的功效。这些网络包括长短期记忆(LSTM)、双向LSTM、卷积神经网络(CNN)和CNN-LSTM网络的混合。“新冠肺炎假新闻”数据集包括42280例新冠肺炎大流行和相关疫苗的实际和假新闻病例,已用于训练和测试这些深度神经网络。执行所提出的模型,并与其他深度神经网络进行比较,发现CNN模型的准确率最高,为95.6%。
{"title":"A Deep Learning Model to Detect Fake News About Covid-19","authors":"S. S. Birunda, R. Kanniga Devi, M. Muthukannan","doi":"10.2174/2666255816666230825100307","DOIUrl":"https://doi.org/10.2174/2666255816666230825100307","url":null,"abstract":"\u0000\u0000Twitter has rapidly become a go-to source for current events coverage. The more people rely on it, the more important it is to provide accurate data. Twitter makes it easy to spread misinformation, which can have a significant impact on how people feel, especially if false information spreads around COVID-19.\u0000\u0000\u0000\u0000Unfortunately, twitter was also used to spread myths and misinformation about the illness and its preventative immunization. So, it is crucial to identify false information before its spread gets out of hand. In this research, we look into the efficacy of several different types of deep neural networks in automatically classifying and identifying fake news content posted on social media platforms in relation to the COVID-19 pandemic. These networks include long short-term memory (LSTM), bi-directional LSTM, convolutional-neural-networks (CNN), and a hybrid of CNN-LSTM networks.\u0000\u0000\u0000\u0000The \"COVID-19 Fake News\" dataset includes 42,280, actual and fake news cases for the COVID-19 pandemic and associated vaccines and has been used to train and test these deep neural networks.\u0000\u0000\u0000\u0000The proposed models are executed and compared to other deep neural networks, the CNN model was found to have the highest accuracy at 95.6%.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41346976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Recommendation System using Ontology-based Similarity and Incremental SVD Prediction 基于本体的相似性和增量SVD预测增强推荐系统
Q3 Computer Science Pub Date : 2023-08-23 DOI: 10.2174/2666255816666230823125227
Sajida Mhammedi, Noreddine Gherabi, Hakim El Massari, M. Amnai
With the explosion of data in recent years, recommender systems have become increasingly important for personalized services and enhancing user engagement in various industries, including e-commerce and entertainment. Collaborative filtering (CF) is a widely used approach for generating recommendations, but it has limitations in addressing issues such as sparsity, scalability, and prediction errors.To address these challenges, this study proposes a novel hybrid CF method for movie recommendations that combines an incremental singular value decomposition approach with an item-based ontological semantic filtering approach in both online and offline phases. The ontology-based technique improves the accuracy of predictions and recommendations. The proposed method is evaluated on a real-world movie recommendation dataset using several performance metrics, including precision, F1 scores, and MAE.The results demonstrate that the proposed method outperforms existing methods in terms of accuracy while also addressing sparsity and scalability issues in recommender systems. Additionally, our approach has the advantage of reduced running time, making it a promising solution for practical applications.The proposed method offers a promising solution to the challenges faced by traditional CF methods in recommender systems. By combining incremental SVD and ontological semantic filtering, the proposed method not only improves the accuracy of predictions and recommendations but also addresses issues related to scalability and sparsity. Overall, the proposed method has the potential to contribute to the development of more accurate and efficient recommendation systems in various industries, including e-commerce and entertainment.
随着近年来数据的爆炸式增长,推荐系统在包括电子商务和娱乐在内的各个行业的个性化服务和提高用户参与度方面变得越来越重要。协作过滤(CF)是一种广泛使用的生成推荐的方法,但它在解决稀疏性、可扩展性和预测错误等问题方面存在局限性。为了应对这些挑战,本研究提出了一种新的电影推荐混合CF方法,该方法在在线和离线阶段将增量奇异值分解方法与基于项目的本体语义过滤方法相结合。基于本体的技术提高了预测和推荐的准确性。该方法在真实世界的电影推荐数据集上使用了几个性能指标进行了评估,包括精度、F1分数和MAE。结果表明,该方法在准确性方面优于现有方法,同时也解决了推荐系统中的稀疏性和可扩展性问题。此外,我们的方法具有减少运行时间的优点,使其成为实际应用的一个有前途的解决方案。所提出的方法为解决推荐系统中传统CF方法所面临的挑战提供了一个很有前途的解决方案。通过将增量SVD和本体语义过滤相结合,该方法不仅提高了预测和推荐的准确性,还解决了与可扩展性和稀疏性相关的问题。总的来说,所提出的方法有可能有助于在包括电子商务和娱乐在内的各个行业开发更准确、更高效的推荐系统。
{"title":"Enhancing Recommendation System using Ontology-based Similarity and Incremental SVD Prediction","authors":"Sajida Mhammedi, Noreddine Gherabi, Hakim El Massari, M. Amnai","doi":"10.2174/2666255816666230823125227","DOIUrl":"https://doi.org/10.2174/2666255816666230823125227","url":null,"abstract":"\u0000\u0000With the explosion of data in recent years, recommender systems have become increasingly important for personalized services and enhancing user engagement in various industries, including e-commerce and entertainment. Collaborative filtering (CF) is a widely used approach for generating recommendations, but it has limitations in addressing issues such as sparsity, scalability, and prediction errors.\u0000\u0000\u0000\u0000To address these challenges, this study proposes a novel hybrid CF method for movie recommendations that combines an incremental singular value decomposition approach with an item-based ontological semantic filtering approach in both online and offline phases. The ontology-based technique improves the accuracy of predictions and recommendations. The proposed method is evaluated on a real-world movie recommendation dataset using several performance metrics, including precision, F1 scores, and MAE.\u0000\u0000\u0000\u0000The results demonstrate that the proposed method outperforms existing methods in terms of accuracy while also addressing sparsity and scalability issues in recommender systems. Additionally, our approach has the advantage of reduced running time, making it a promising solution for practical applications.\u0000\u0000\u0000\u0000The proposed method offers a promising solution to the challenges faced by traditional CF methods in recommender systems. By combining incremental SVD and ontological semantic filtering, the proposed method not only improves the accuracy of predictions and recommendations but also addresses issues related to scalability and sparsity. Overall, the proposed method has the potential to contribute to the development of more accurate and efficient recommendation systems in various industries, including e-commerce and entertainment.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41430164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Buffer Management Techniques in Delay Tolerant Networks: A Comprehensive Survey 延迟容忍网络中的缓冲管理技术:综述
Q3 Computer Science Pub Date : 2023-08-17 DOI: 10.2174/2666255816666230817101831
Savita Singh, Ankita Verma
This paper aims to provide a comprehensive study of the underlying buffer management issues and challenges in developing an efficient DTN routing protocol. Our aim is to begin with the discussion of buffer management schemes in DTNs in full generality and then dive in-depth, covering aspects of buffer management. Buffer strategies are used to determine which packets need to be forwarded or dropped. This paper will focus on the variety of buffer management strategies available, providing a comprehensive survey and analysis. We have also conducted an empirical analysis using simulator ONE to analyze the buffering time in various primary routing protocols such as Epidemic, Spary-and-wait (SNW), Prophet, Encounter based Routing (EBR) and Inter-Contact Delay and Location Information based Routing (ICDLIR). For these algorithms, it is also observed how varying the buffer size effect the delivery probability and overhead.
本文旨在对开发高效DTN路由协议的潜在缓冲区管理问题和挑战进行全面研究。我们的目标是首先全面讨论ddn中的缓冲区管理方案,然后深入讨论缓冲区管理的各个方面。缓冲区策略用于确定哪些数据包需要转发或丢弃。本文将重点对现有的各种缓冲管理策略进行全面的调查和分析。我们还使用模拟器ONE进行了实证分析,分析了各种主要路由协议中的缓冲时间,如流行病,稀疏和等待(SNW),先知,基于相遇的路由(EBR)和基于接触延迟和位置信息的路由(ICDLIR)。对于这些算法,还观察了不同缓冲区大小对传递概率和开销的影响。
{"title":"Buffer Management Techniques in Delay Tolerant Networks: A Comprehensive Survey","authors":"Savita Singh, Ankita Verma","doi":"10.2174/2666255816666230817101831","DOIUrl":"https://doi.org/10.2174/2666255816666230817101831","url":null,"abstract":"\u0000\u0000This paper aims to provide a comprehensive study of the underlying buffer management issues and challenges in developing an efficient DTN routing protocol. Our aim is to begin with the discussion of buffer management schemes in DTNs in full generality and then dive in-depth, covering aspects of buffer management. Buffer strategies are used to determine which packets need to be forwarded or dropped. This paper will focus on the variety of buffer management strategies available, providing a comprehensive survey and analysis. We have also conducted an empirical analysis using simulator ONE to analyze the buffering time in various primary routing protocols such as Epidemic, Spary-and-wait (SNW), Prophet, Encounter based Routing (EBR) and Inter-Contact Delay and Location Information based Routing (ICDLIR). For these algorithms, it is also observed how varying the buffer size effect the delivery probability and overhead.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48660072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Extreme Learning Machine Algorithm with Deterministic Weight Modification for Investment Decisions based on Sentiment Analysis 基于情感分析的具有确定性权重修正的改进极限学习机投资决策算法
Q3 Computer Science Pub Date : 2023-08-15 DOI: 10.2174/2666255816666230815121119
K. Kalaiselvi, V. David
A significant problem in economics is stock market prediction. Due to the noise and volatility, however, timely prediction is typically regarded as one of the most difficult challenges. A sentiment-based stock price prediction that takes investors' emotional trends into account to overcome these difficulties is essential.This study aims to enhance the ELM's generalization performance and prediction accuracy.This article presents a new sentiment analysis based-stock prediction method using a modified extreme learning machine (ELM) with deterministic weight modification (DWM) called S-DELM. First, investor sentiment is used in stock prediction, which can considerably increase the model's predictive power. Hence, a convolutional neural network (CNN) is used to classify the user comments. Second, DWM is applied to optimize the weights and biases of ELM.The results of the experiments demonstrate that the S-DELM may not only increase prediction accuracy but also shorten prediction time, and investors' emotional tendencies are proven to help them achieve the expected results.The performance of S-DELM is compared with different variants of ELM and some conventional method.
经济学中的一个重要问题是股票市场预测。然而,由于噪声和波动性,及时预测通常被认为是最困难的挑战之一。基于情绪的股价预测,将投资者的情绪趋势考虑在内,以克服这些困难是至关重要的。本研究旨在提高ELM的泛化性能和预测精度。本文提出了一种新的基于情绪分析的股票预测方法,该方法使用具有确定性权重修正(DWM)的修正极限学习机(ELM),称为S-DELM。首先,投资者情绪被用于股票预测,这可以大大提高模型的预测能力。因此,使用卷积神经网络(CNN)对用户评论进行分类。其次,将DWM应用于ELM的权重和偏差优化。实验结果表明,S-DELM不仅可以提高预测精度,而且可以缩短预测时间,投资者的情绪倾向也可以帮助他们实现预期结果。将S-DELM的性能与ELM的不同变体和一些传统方法进行了比较。
{"title":"Modified Extreme Learning Machine Algorithm with Deterministic Weight Modification for Investment Decisions based on Sentiment Analysis","authors":"K. Kalaiselvi, V. David","doi":"10.2174/2666255816666230815121119","DOIUrl":"https://doi.org/10.2174/2666255816666230815121119","url":null,"abstract":"\u0000\u0000A significant problem in economics is stock market prediction. Due to the noise and volatility, however, timely prediction is typically regarded as one of the most difficult challenges. A sentiment-based stock price prediction that takes investors' emotional trends into account to overcome these difficulties is essential.\u0000\u0000\u0000\u0000This study aims to enhance the ELM's generalization performance and prediction accuracy.\u0000\u0000\u0000\u0000This article presents a new sentiment analysis based-stock prediction method using a modified extreme learning machine (ELM) with deterministic weight modification (DWM) called S-DELM. First, investor sentiment is used in stock prediction, which can considerably increase the model's predictive power. Hence, a convolutional neural network (CNN) is used to classify the user comments. Second, DWM is applied to optimize the weights and biases of ELM.\u0000\u0000\u0000\u0000The results of the experiments demonstrate that the S-DELM may not only increase prediction accuracy but also shorten prediction time, and investors' emotional tendencies are proven to help them achieve the expected results.\u0000\u0000\u0000\u0000The performance of S-DELM is compared with different variants of ELM and some conventional method.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42844433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Model Incorporating Multiple Spatial Relations in 3D Space 三维空间中包含多种空间关系的综合模型
Q3 Computer Science Pub Date : 2023-08-15 DOI: 10.2174/2666255816666230815094558
Mengmeng Li, Weiguang Liu, Yuanyuan Zhao, Jixun Gao, Miao Wang, Zhenxi Fang
A Comprehensive Model Incorporating Multiple Spatial Relations in 3D Space.At present, the research on two-dimensional spatial relation expression and inference models is relatively mature, but these models cannot be used to deal with three-dimensional spatial orientation relations. With the application of spatial orientation relations, three-dimensional spatial orientation relations are involved in many fields such as urban architectural design, robotics, image processing, etc. Two-dimensional spatial orientation relations models cannot satisfy the needs of three-dimensional spatial applications, so there is an urgent need to research three-dimensional spatial object orientation relations expression and inference models.This work aims to provide a comprehensive model incorporating multiple spatial relations in 3D space. The joint representation of direction, distance, and topological relations describes more complex spatial position relations among objects.Based on this comprehensive model, the computational properties of interval algebra are used to combine the directional and topological relations.The study lays a good foundation for the formal representation and reasoning of spatial relations between regions, enhances the analyzability of spatial relations between objects, and improves the accuracy of spatial analysis.The main novel contribution of this paper is that we propose a comprehensive orientation relation model, called 3D-TRD, which considers three spatial orientation relations simultaneously. The paper gives examples to represent the position relations of two spatial objects by comparing the RCC8 model, the 3DR46 model, and the comprehensive model to highlight the advantages of our proposed model. Based on the model, the bidirectional mapping association method is also used to represent the location of the spatial objects. The first advantage of the 3D-TRD model is that it represents spatial location relations more accurately than 3DR46, RCC8, and five qualitative distances. The second advantage of the 3D-TRD model is that it proposes a bidirectional mapping representation in three-dimensional space. The third advantage of the 3D-TRD model is that it provides a good basis for the formal representation and inference study of the spatial relations between regions.
三维空间中包含多个空间关系的综合模型目前,二维空间关系表达和推理模型的研究相对成熟,但这些模型还不能用于处理三维空间方位关系。随着空间取向关系的应用,三维空间取向关系涉及到城市建筑设计、机器人、图像处理等诸多领域。二维空间取向关系模型不能满足三维空间应用的需要,因此迫切需要研究三维空间对象取向关系表达与推理模型。本研究旨在提供一个包含三维空间中多个空间关系的综合模型。方向、距离和拓扑关系的联合表示描述了对象之间更复杂的空间位置关系。在此综合模型的基础上,利用区间代数的计算性质将方向关系和拓扑关系结合起来。该研究为区域间空间关系的形式化表示和推理奠定了良好的基础,增强了对象间空间关系的可分析性,提高了空间分析的准确性。本文的主要创新之处是提出了一种综合的方向关系模型,称为3D-TRD,该模型同时考虑了三个空间方向关系。通过比较RCC8模型、3DR46模型和综合模型,给出了两个空间目标位置关系的表示实例,以突出本文模型的优势。在此基础上,采用双向映射关联方法表示空间对象的位置。3D-TRD模型的第一个优点是,它比3DR46、RCC8和5个定性距离更准确地表示空间位置关系。3D-TRD模型的第二个优点是它提出了三维空间中的双向映射表示。3D-TRD模型的第三个优点是为区域间空间关系的形式化表示和推理研究提供了良好的基础。
{"title":"A Comprehensive Model Incorporating Multiple Spatial Relations in 3D Space","authors":"Mengmeng Li, Weiguang Liu, Yuanyuan Zhao, Jixun Gao, Miao Wang, Zhenxi Fang","doi":"10.2174/2666255816666230815094558","DOIUrl":"https://doi.org/10.2174/2666255816666230815094558","url":null,"abstract":"\u0000\u0000A Comprehensive Model Incorporating Multiple Spatial Relations in 3D Space.\u0000\u0000\u0000\u0000At present, the research on two-dimensional spatial relation expression and inference models is relatively mature, but these models cannot be used to deal with three-dimensional spatial orientation relations. With the application of spatial orientation relations, three-dimensional spatial orientation relations are involved in many fields such as urban architectural design, robotics, image processing, etc. Two-dimensional spatial orientation relations models cannot satisfy the needs of three-dimensional spatial applications, so there is an urgent need to research three-dimensional spatial object orientation relations expression and inference models.\u0000\u0000\u0000\u0000This work aims to provide a comprehensive model incorporating multiple spatial relations in 3D space. The joint representation of direction, distance, and topological relations describes more complex spatial position relations among objects.\u0000\u0000\u0000\u0000Based on this comprehensive model, the computational properties of interval algebra are used to combine the directional and topological relations.\u0000\u0000\u0000\u0000The study lays a good foundation for the formal representation and reasoning of spatial relations between regions, enhances the analyzability of spatial relations between objects, and improves the accuracy of spatial analysis.\u0000\u0000\u0000\u0000The main novel contribution of this paper is that we propose a comprehensive orientation relation model, called 3D-TRD, which considers three spatial orientation relations simultaneously. The paper gives examples to represent the position relations of two spatial objects by comparing the RCC8 model, the 3DR46 model, and the comprehensive model to highlight the advantages of our proposed model. Based on the model, the bidirectional mapping association method is also used to represent the location of the spatial objects. The first advantage of the 3D-TRD model is that it represents spatial location relations more accurately than 3DR46, RCC8, and five qualitative distances. The second advantage of the 3D-TRD model is that it proposes a bidirectional mapping representation in three-dimensional space. The third advantage of the 3D-TRD model is that it provides a good basis for the formal representation and inference study of the spatial relations between regions.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46376815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Recent Advances in Computer Science and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1