At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events.
{"title":"Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN","authors":"Linli Wang, Hu Wang, Hanlu Lei","doi":"10.4236/jcc.2023.115014","DOIUrl":"https://doi.org/10.4236/jcc.2023.115014","url":null,"abstract":"At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70937050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote both new and viral applications as well as disseminate information. Social network analysis is the study of these information networks that leads to uncovering patterns of interaction among the entities. In this regard, finding influential users in OSNs is very important as they play a key role in the success above phenomena. Various approaches exist to detect influential users in OSNs, starting from simply counting the immediate neighbors to more complex machine-learning and message-passing techniques. In this paper, we review the recent existing research works that focused on identifying influential users in OSNs.
用户加入网络,发布自己的内容,并与其他用户建立链接的信息网络称为在线社交网络(Online Social networks,简称osn)。如今,osn已成为新兴应用和病毒式应用的主要推广平台和信息传播平台之一。社会网络分析是对这些信息网络的研究,它可以揭示实体之间的交互模式。因此,在osn中找到有影响力的用户是非常重要的,因为他们对上述现象的成功起着关键作用。有各种方法可以检测osn中有影响力的用户,从简单地计算近邻到更复杂的机器学习和消息传递技术。在本文中,我们回顾了近年来现有的研究工作,重点是识别osn中有影响力的用户。
{"title":"Identification of Influential Users in Online Social Network: A Brief Overview","authors":"M. Ferdous, M. Anwar","doi":"10.4236/jcc.2023.117005","DOIUrl":"https://doi.org/10.4236/jcc.2023.117005","url":null,"abstract":"Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote both new and viral applications as well as disseminate information. Social network analysis is the study of these information networks that leads to uncovering patterns of interaction among the entities. In this regard, finding influential users in OSNs is very important as they play a key role in the success above phenomena. Various approaches exist to detect influential users in OSNs, starting from simply counting the immediate neighbors to more complex machine-learning and message-passing techniques. In this paper, we review the recent existing research works that focused on identifying influential users in OSNs.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70938012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indicator Selection for Quality Measurement in Maternal Neonatal and Child Health Services: Application of Random Forest Classifier","authors":"Sarah Nyanjara, D. Machuve, P. Nykanen","doi":"10.4236/jcc.2023.117006","DOIUrl":"https://doi.org/10.4236/jcc.2023.117006","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70938715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Water Level Forecast of Pattani River in the Southern of Thailand by Deep Learning","authors":"Prattana Deeprasertkul, Kanoksri Sarinnapakorn","doi":"10.4236/jcc.2023.118002","DOIUrl":"https://doi.org/10.4236/jcc.2023.118002","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70939091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.1110003
Sai Madhur Potturu
This research paper explores the significance of the “A360 Bot Framework” in Automation 360 (A360) platform. A360 is Automation Anywhere’s cloud-based automation platform designed to make business processes more efficient. It’s known for its user-friendly interface, which allows both technical and non-technical users to use it effectively. Automation 360 is versatile, offering a range of tools to automate tasks, manage complex workflows, and integrate various applications. It empowers users to create customized solutions for their specific needs. Being cloud-based it ensures scalability, security, and real-time updates, making it a top choice in the fast-paced digital world. As demand for A360 rises, having a structured way to develop bots becomes crucial. The paper introduces the “A360 Bot Framework” as a guiding approach for bot developments. This framework ensures consistency and scalability, especially when working with both professional developers and non-technical users. It outlines key elements like setting up work folders, managing logs, dealing with errors, and ensuring secure bot execution. Ultimately, the “A360 Bot Framework” is presented as a foundational structure that enhances consistency, resiliency, and development efficiency. By following predefined practices and templates, bot developers can mitigate risks and streamline debugging processes. This framework accelerates the bot development lifecycle, allowing developers to focus on specific functionalities and value-added features. The research paper aims to provide insights into the benefits of adopting the A360 Bot Framework and its potential to revolutionize A360 bot development practices, leading to more efficient and effective automation solutions.
{"title":"A360 Bot Framework: Empowering Smart Robotic Process Automation Solutions","authors":"Sai Madhur Potturu","doi":"10.4236/jcc.2023.1110003","DOIUrl":"https://doi.org/10.4236/jcc.2023.1110003","url":null,"abstract":"This research paper explores the significance of the “A360 Bot Framework” in Automation 360 (A360) platform. A360 is Automation Anywhere’s cloud-based automation platform designed to make business processes more efficient. It’s known for its user-friendly interface, which allows both technical and non-technical users to use it effectively. Automation 360 is versatile, offering a range of tools to automate tasks, manage complex workflows, and integrate various applications. It empowers users to create customized solutions for their specific needs. Being cloud-based it ensures scalability, security, and real-time updates, making it a top choice in the fast-paced digital world. As demand for A360 rises, having a structured way to develop bots becomes crucial. The paper introduces the “A360 Bot Framework” as a guiding approach for bot developments. This framework ensures consistency and scalability, especially when working with both professional developers and non-technical users. It outlines key elements like setting up work folders, managing logs, dealing with errors, and ensuring secure bot execution. Ultimately, the “A360 Bot Framework” is presented as a foundational structure that enhances consistency, resiliency, and development efficiency. By following predefined practices and templates, bot developers can mitigate risks and streamline debugging processes. This framework accelerates the bot development lifecycle, allowing developers to focus on specific functionalities and value-added features. The research paper aims to provide insights into the benefits of adopting the A360 Bot Framework and its potential to revolutionize A360 bot development practices, leading to more efficient and effective automation solutions.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135156111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.
{"title":"Blockchain-Based Certificate Authentication System with Enabling Correction","authors":"Md. Mijanur Rahman, Md. Tanzinul Kabir Tonmoy, Saifur Rahman Shihab, Riya Farhana","doi":"10.4236/jcc.2023.113006","DOIUrl":"https://doi.org/10.4236/jcc.2023.113006","url":null,"abstract":"Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135585548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eric Michel Deussom Djomadji, Kabiena Ivan Basile, Tchapga Tchito Christian, F. Djoko, M. E. Sone
{"title":"Machine Learning-Based Approach for Identification of SIM Box Bypass Fraud in a Telecom Network Based on CDR Analysis: Case of a Fixed and Mobile Operator in Cameroon","authors":"Eric Michel Deussom Djomadji, Kabiena Ivan Basile, Tchapga Tchito Christian, F. Djoko, M. E. Sone","doi":"10.4236/jcc.2023.112010","DOIUrl":"https://doi.org/10.4236/jcc.2023.112010","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of 3D Human Posture Based on Improved Mediapipe","authors":"Yiqiao Lin, Xueyan Jiao, Lei Zhao","doi":"10.4236/jcc.2023.112008","DOIUrl":"https://doi.org/10.4236/jcc.2023.112008","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deussom Djomadji Eric Michel, Takembo Ntahkie Clovis, Tchapga Tchito Christian, A. Mohamadou, M. E. Sone
{"title":"Machine Learning-Based Alarms Classification and Correlation in an SDH/WDM Optical Network to Improve Network Maintenance","authors":"Deussom Djomadji Eric Michel, Takembo Ntahkie Clovis, Tchapga Tchito Christian, A. Mohamadou, M. E. Sone","doi":"10.4236/jcc.2023.112009","DOIUrl":"https://doi.org/10.4236/jcc.2023.112009","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}