The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M...The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity.展开更多
In the current society, based on the growing development of network information technology, the teaching in many colleges and universities has also introduced it to adapt to the situation. This trend can provide more ...In the current society, based on the growing development of network information technology, the teaching in many colleges and universities has also introduced it to adapt to the situation. This trend can provide more useful conditions for students to learn, which requires students to master enough self-learning abilities to adapt to this model. The study in the paper shows that students are usually interested in autonomous learning in a multimodal environment, but the degree of strategy choice is relatively low, and the learning process is blind and passive with the lack of self-confidence. Facing the future, schools should actively integrate into network thinking, and teachers should change their roles and train and guide students’ learning strategies and learning motivations, so as to achieve better teaching results.展开更多
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwardin...Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead.展开更多
The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni...The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.展开更多
Using the Wireless Sensor Networks WSNs in a wide variety of applications is currently considered one of the most challenging solutions. For instance, this technology has evolved the agriculture field, with the precis...Using the Wireless Sensor Networks WSNs in a wide variety of applications is currently considered one of the most challenging solutions. For instance, this technology has evolved the agriculture field, with the precision agriculture challenge. In fact, the cost of sensors and communication infrastructure continuously trend down as long as the technological advances. So, more growers dare to implement WSN for their crops. This technology has drawn substantial interests by improving agriculture productivity. The idea consists of deploying a number of sensors in a given agricultural parcel in order to monitor the land and crop conditions. These readings help the farmer to make the right inputs at the right moment. In this paper, we propose a complete solution for gathering different type of data from variable fields of a large agricultural parcel. In fact, with the in-field variability, adopting a unique data gathering solution for all kinds of fields reveals an inconvenient approach. Besides, as a fault-tolerant application, precision agriculture does not require a high precision value of sensed data. So, our approach deals with a context aware data gathering strategy. In other words, depending on a defined context for the monitored field, the data collector will decide the data gathering strategy to follow. We prove that this approach improves considerably the lifetime of the application.展开更多
Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be...Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be used in pervasive healthcare monitoring for relating importance to events and specifically for accurate episode detection. In this paper, we address the issue of context-aware sensing in BSNs, and survey different techniques for deducing context awareness.展开更多
Cooperative wireless sensor networks have drastically grown due to node co-opera- tive in unaltered environment. Various real time applications are developed and deployed under cooperative network, which controls and ...Cooperative wireless sensor networks have drastically grown due to node co-opera- tive in unaltered environment. Various real time applications are developed and deployed under cooperative network, which controls and coordinates the flow to and from the nodes to the base station. Though nodes are interlinked to give expected state behavior, it is vital to monitor the malicious activities in the network. There is a high end probability to compromise the node behavior that leads to catastrophes. To overcome this issue a Novel Context Aware-IDS approach named Context Aware Nodal Deployment-IDS (CAND-IDS) is framed. During data transmission based on node properties and behavior CAND-IDS detects and eliminates the malicious nodes in the explored path. Also during network deployment and enhancement, node has to follow Context Aware Cooperative Routing Protocol (CCRP), to ensure the reliability of the network. CAND-IDS are programmed and simulated using Network Simulator software and the performance is verified and evaluated. The simulation result shows significant improvements in the throughput, energy consumption and delay made when compared with the existing system.展开更多
Boolean control network consists of a set of Boolean variables whose state is determined by other variables in the network. Boolean network is used for modeling complex system. In this paper, we have presented a model...Boolean control network consists of a set of Boolean variables whose state is determined by other variables in the network. Boolean network is used for modeling complex system. In this paper, we have presented a model of a context-aware system used in smart home based on Boolean control networks. This modeling describes the relationship between the context elements (person, time, location, and activity) and services (Morning Call, Sleeping, Guarding, Entertainment, and normal), which is effective to logical inference. We apply semi tensor matrix product to describe the dynamic of the system. This matrix form of expression is a convenient and reasonable way to design logic control system.展开更多
The information society makes people's lives gradually enter a digital state for living. And the popularity of the Internet has led to the unique phenomenon of network words. What impact will network and the combi...The information society makes people's lives gradually enter a digital state for living. And the popularity of the Internet has led to the unique phenomenon of network words. What impact will network and the combination of language bring about? This article will explore the relation between the phenomenon of network words and social context from the angle of social linguistic through the analysis of network words and grammatical features.展开更多
As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are in...As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible.展开更多
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-...In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.展开更多
In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger....In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger.Many traditional solutions have been proposed based on the creation of random routes,such as random walk and fake sources approach,which will lead to serious packet delay and high energy consumption.Instead of applying the routing in a blind way,this article proposes a novel solution for source location privacy in WSNs by utilizing sensor ability of perceiving the presence a mobile attacker nearby,for patient attackers in particular to increase the safety period and decrease the data delivery delay.The proposed strategy forms an intelligent silent zone(ISZ)by sacrificing only a minority of sensor nodes to entice patient attackers away from real packet routing path.The analysis and simulation results show that the proposed scheme,besides providing source location privacy energy efficiently,can significantly reduce real event reporting latency compared with the existing approaches.展开更多
Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually gen...Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually generated by a duplication of the corresponding low frequencies and some parameters of high frequencies. However, the perception quality of coding will significantly degrade if the correlation between high frequencies and low frequencies becomes weak. In this paper, we quantitatively analyse the correlation via computing mutual information value. The analysis results show the correlation also exists in low frequency signal of the context dependent frames besides the current frame. In order to improve the perception quality of coding, we propose a novel method of high frequency coarse spectrum generation to improve the conventional replication method. In the proposed method, the coarse high frequency spectrums are generated by a nonlinear mapping model using deep recurrent neural network. The experiments confirm that the proposed method shows better performance than the reference methods.展开更多
为解决现有的事件抽取方法在实体抽取子任务中难以充分利用上下文信息,导致事件抽取精度较低的问题,提出了基于跨度和图卷积网络的篇章级事件抽取(document-level event extraction based on span and graph convolutional network, DEE...为解决现有的事件抽取方法在实体抽取子任务中难以充分利用上下文信息,导致事件抽取精度较低的问题,提出了基于跨度和图卷积网络的篇章级事件抽取(document-level event extraction based on span and graph convolutional network, DEESG)模型。首先,设计中间线性层对编码的向量进行线性处理,并结合标注信息计算最佳跨度,通过提升对跨度开始位置和结束位置判断的准确度来提高实体抽取的精度;接着,提出异构图的构建方法,使用池化策略将实体与句子表示为图的节点,根据提出的建边规则构建异构图,以此建立全局信息的交互,并利用多层图卷积网络(graph convolutional network, GCN)对异构图进行卷积,获得具有上下文信息的实体表示和句子表示,以此解决上下文信息利用不充分的问题;然后,利用多头注意力机制进行事件类型的检测;最后,为组合中的实体分配论元角色,完成事件抽取任务。在中文金融公告(Chinese financial announcements, ChFinAnn)数据集上进行实验。结果表明,与拥有追踪器的异构图交互模型(graph-based interaction model with a tracker, GIT)相比,DEESG模型的F1分数提升了1.3个百分点。该研究证实DEESG模型能有效应用于篇章级事件抽取领域。展开更多
Real-time video data transmission is currently emerging as a popular application among mobile users but it is very sensitive to QoS degradation due to packet losses in wireless networks.In order to achieve service con...Real-time video data transmission is currently emerging as a popular application among mobile users but it is very sensitive to QoS degradation due to packet losses in wireless networks.In order to achieve service continuity and integrity upon handoffs among heterogeneous networks,provisioning of seamless and secure mobility is required.However,in order to reduce the delay and packet losses during vertical handovers we need to employ supportive protocols like context transfer.In this paper we evaluate the QoS of video transmission over a heterogeneous 3G-WLAN network.The aggregate video data traffic is represented by a dynamic two-dimensional Markov chain model,which has been evaluated against real video data measurement.Upon the vertical handover, appropriate AAA handshaking and enhanced mobility management using context transfer have been considered.Perceived QoS evaluation of video streams was performed based on peak signal-noise ratio(PSNR) measurements,while we analyticallyestimated the number of packet losses during handovers.The results show that both packet loss within the converged network and loss occurrence affecting the perceived video quality is reduced. Moreover,the proposed context transfer scheme minimizes handover delay and the number of lost packet up to 3 times compared to standard AAA handshaking.展开更多
The present study examined disclosure and use of privacy settings in online social networking profiles as a function of the media context (i.e., online versus hard copy (paper and pencil) FacebookTM profiles). Gender ...The present study examined disclosure and use of privacy settings in online social networking profiles as a function of the media context (i.e., online versus hard copy (paper and pencil) FacebookTM profiles). Gender was also examined. Overall, participants disclosed more information when constructing a profile for another person when using a hard copy paper and pencil format than an online context. Gender differences were not uniform across media contexts, however, in contrast to traditional disclosure theory, females censored their disclosures more so than males but only for some topics. Only 20% of the sample increased their use of privacy settings. Consistent with patterns of disclosure, descriptive comparison suggests that more settings were employed in the paper and pencil than online context and more privacy settings were employed by females.展开更多
In this paper, we propose an incremental method of Granular Networks (GN) to construct conceptual and computational platform of Granular Computing (GrC). The essence of this network is to describe the associations bet...In this paper, we propose an incremental method of Granular Networks (GN) to construct conceptual and computational platform of Granular Computing (GrC). The essence of this network is to describe the associations between information granules including fuzzy sets formed both in the input and output spaces. The context within which such relationships are being formed is established by the system developer. Here information granules are built using Context-driven Fuzzy Clustering (CFC). This clustering develops clusters by preserving the homogeneity of the clustered patterns associated with the input and output space. The experimental results on well-known software module of Medical Imaging System (MIS) revealed that the incremental granular network showed a good performance in comparison to other previous literature.展开更多
基金Supported by the National Natural Science Foundation of China(71662014 and 61602219)the Natural Science Foundation of Jiangxi Province of China(20132BAB201050)the Science and Technology Project of Jiangxi Province Educational Department(GJJ151601)
文摘The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity.
文摘In the current society, based on the growing development of network information technology, the teaching in many colleges and universities has also introduced it to adapt to the situation. This trend can provide more useful conditions for students to learn, which requires students to master enough self-learning abilities to adapt to this model. The study in the paper shows that students are usually interested in autonomous learning in a multimodal environment, but the degree of strategy choice is relatively low, and the learning process is blind and passive with the lack of self-confidence. Facing the future, schools should actively integrate into network thinking, and teachers should change their roles and train and guide students’ learning strategies and learning motivations, so as to achieve better teaching results.
基金Supported by the National Natural Science Foundation of China(61373040,61173137)the Ph.D.Programs Foundation of Ministry of Education of China(20120141110002)the Key Project of Natural Science Foundation of Hubei Province(2010CDA004)
文摘Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead.
文摘The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it.
文摘Using the Wireless Sensor Networks WSNs in a wide variety of applications is currently considered one of the most challenging solutions. For instance, this technology has evolved the agriculture field, with the precision agriculture challenge. In fact, the cost of sensors and communication infrastructure continuously trend down as long as the technological advances. So, more growers dare to implement WSN for their crops. This technology has drawn substantial interests by improving agriculture productivity. The idea consists of deploying a number of sensors in a given agricultural parcel in order to monitor the land and crop conditions. These readings help the farmer to make the right inputs at the right moment. In this paper, we propose a complete solution for gathering different type of data from variable fields of a large agricultural parcel. In fact, with the in-field variability, adopting a unique data gathering solution for all kinds of fields reveals an inconvenient approach. Besides, as a fault-tolerant application, precision agriculture does not require a high precision value of sensed data. So, our approach deals with a context aware data gathering strategy. In other words, depending on a defined context for the monitored field, the data collector will decide the data gathering strategy to follow. We prove that this approach improves considerably the lifetime of the application.
文摘Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be used in pervasive healthcare monitoring for relating importance to events and specifically for accurate episode detection. In this paper, we address the issue of context-aware sensing in BSNs, and survey different techniques for deducing context awareness.
文摘Cooperative wireless sensor networks have drastically grown due to node co-opera- tive in unaltered environment. Various real time applications are developed and deployed under cooperative network, which controls and coordinates the flow to and from the nodes to the base station. Though nodes are interlinked to give expected state behavior, it is vital to monitor the malicious activities in the network. There is a high end probability to compromise the node behavior that leads to catastrophes. To overcome this issue a Novel Context Aware-IDS approach named Context Aware Nodal Deployment-IDS (CAND-IDS) is framed. During data transmission based on node properties and behavior CAND-IDS detects and eliminates the malicious nodes in the explored path. Also during network deployment and enhancement, node has to follow Context Aware Cooperative Routing Protocol (CCRP), to ensure the reliability of the network. CAND-IDS are programmed and simulated using Network Simulator software and the performance is verified and evaluated. The simulation result shows significant improvements in the throughput, energy consumption and delay made when compared with the existing system.
文摘Boolean control network consists of a set of Boolean variables whose state is determined by other variables in the network. Boolean network is used for modeling complex system. In this paper, we have presented a model of a context-aware system used in smart home based on Boolean control networks. This modeling describes the relationship between the context elements (person, time, location, and activity) and services (Morning Call, Sleeping, Guarding, Entertainment, and normal), which is effective to logical inference. We apply semi tensor matrix product to describe the dynamic of the system. This matrix form of expression is a convenient and reasonable way to design logic control system.
文摘现有的基于深度学习的医学图像分割方法,大多是利用大量的训练数据拟合检测网络,以获得优异的检测性能。这些方法往往需要较大的模型参数,导致检测实时性较差。为此,提出了基于局部上下文引导特征深度融合轻量级医学分割网络(local context guided feature deep fusion lightweight medical segmentation network,LCGML-net)。LCGML-net通过精确的特征选择与特征融合来减少模型拟合所需的参数数量,从而在保证检测精度的同时实现更小的模型参数。在特征提取阶段和映射阶段,分别通过提取和融合目标的多层次多尺度局部上下文特征来丰富特征表达和精准分割。在STARE、CHASEDB1和KITS19等多个基准数据集上开展的实验证明,与其他方法相比,所提出的LCGML-net具有最佳的检测性能和最小的模型参数。
文摘The information society makes people's lives gradually enter a digital state for living. And the popularity of the Internet has led to the unique phenomenon of network words. What impact will network and the combination of language bring about? This article will explore the relation between the phenomenon of network words and social context from the angle of social linguistic through the analysis of network words and grammatical features.
基金supported by State Key Laboratory of Software Development Environment under Grant No. SKLSDE-2009ZX-02China Aviation Science Fund under Grant No.20081951National High Technical Research and Development Program of China (863 Program) under Grant No.2007AA01Z183
文摘As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible.
基金the Major national S&T program under Grant No. 2011ZX03005-002National Natural Science Foundation of China under Grant No. 60872041,61072066the Fundamental Research Funds for the Central Universities under Grant No. JY10000903001,JY10000901034
文摘In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.
基金supported by the National Natural Science Foundation of China (Nos.61373015,61300052, 41301047)the Priority Academic Program Development of Jiangsu Higher Education Institutionsthe Important National Science and Technology Specific Project(No. BA2013049)
文摘In many wireless sensor networks(WSNs)applications,the preservation of source-location privacy plays a critical role in concealing context information,otherwise the monitored entities or subjects may be put in danger.Many traditional solutions have been proposed based on the creation of random routes,such as random walk and fake sources approach,which will lead to serious packet delay and high energy consumption.Instead of applying the routing in a blind way,this article proposes a novel solution for source location privacy in WSNs by utilizing sensor ability of perceiving the presence a mobile attacker nearby,for patient attackers in particular to increase the safety period and decrease the data delivery delay.The proposed strategy forms an intelligent silent zone(ISZ)by sacrificing only a minority of sensor nodes to entice patient attackers away from real packet routing path.The analysis and simulation results show that the proposed scheme,besides providing source location privacy energy efficiently,can significantly reduce real event reporting latency compared with the existing approaches.
基金supported by the National Natural Science Foundation of China under Grant No. 61762005, 61231015, 61671335, 61702472, 61701194, 61761044, 61471271National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA016306+2 种基金 Hubei Province Technological Innovation Major Project under Grant No. 2016AAA015the Science Project of Education Department of Jiangxi Province under No. GJJ150585The Opening Project of Collaborative Innovation Center for Economics Crime Investigation and Prevention Technology, Jiangxi Province, under Grant No. JXJZXTCX-025
文摘Non-blind audio bandwidth extension is a standard technique within contemporary audio codecs to efficiently code audio signals at low bitrates. In existing methods, in most cases high frequencies signal is usually generated by a duplication of the corresponding low frequencies and some parameters of high frequencies. However, the perception quality of coding will significantly degrade if the correlation between high frequencies and low frequencies becomes weak. In this paper, we quantitatively analyse the correlation via computing mutual information value. The analysis results show the correlation also exists in low frequency signal of the context dependent frames besides the current frame. In order to improve the perception quality of coding, we propose a novel method of high frequency coarse spectrum generation to improve the conventional replication method. In the proposed method, the coarse high frequency spectrums are generated by a nonlinear mapping model using deep recurrent neural network. The experiments confirm that the proposed method shows better performance than the reference methods.
文摘为解决现有的事件抽取方法在实体抽取子任务中难以充分利用上下文信息,导致事件抽取精度较低的问题,提出了基于跨度和图卷积网络的篇章级事件抽取(document-level event extraction based on span and graph convolutional network, DEESG)模型。首先,设计中间线性层对编码的向量进行线性处理,并结合标注信息计算最佳跨度,通过提升对跨度开始位置和结束位置判断的准确度来提高实体抽取的精度;接着,提出异构图的构建方法,使用池化策略将实体与句子表示为图的节点,根据提出的建边规则构建异构图,以此建立全局信息的交互,并利用多层图卷积网络(graph convolutional network, GCN)对异构图进行卷积,获得具有上下文信息的实体表示和句子表示,以此解决上下文信息利用不充分的问题;然后,利用多头注意力机制进行事件类型的检测;最后,为组合中的实体分配论元角色,完成事件抽取任务。在中文金融公告(Chinese financial announcements, ChFinAnn)数据集上进行实验。结果表明,与拥有追踪器的异构图交互模型(graph-based interaction model with a tracker, GIT)相比,DEESG模型的F1分数提升了1.3个百分点。该研究证实DEESG模型能有效应用于篇章级事件抽取领域。
基金financed by the Greek General Secretariat for Research and Technology(GSRT) grant PENED
文摘Real-time video data transmission is currently emerging as a popular application among mobile users but it is very sensitive to QoS degradation due to packet losses in wireless networks.In order to achieve service continuity and integrity upon handoffs among heterogeneous networks,provisioning of seamless and secure mobility is required.However,in order to reduce the delay and packet losses during vertical handovers we need to employ supportive protocols like context transfer.In this paper we evaluate the QoS of video transmission over a heterogeneous 3G-WLAN network.The aggregate video data traffic is represented by a dynamic two-dimensional Markov chain model,which has been evaluated against real video data measurement.Upon the vertical handover, appropriate AAA handshaking and enhanced mobility management using context transfer have been considered.Perceived QoS evaluation of video streams was performed based on peak signal-noise ratio(PSNR) measurements,while we analyticallyestimated the number of packet losses during handovers.The results show that both packet loss within the converged network and loss occurrence affecting the perceived video quality is reduced. Moreover,the proposed context transfer scheme minimizes handover delay and the number of lost packet up to 3 times compared to standard AAA handshaking.
文摘The present study examined disclosure and use of privacy settings in online social networking profiles as a function of the media context (i.e., online versus hard copy (paper and pencil) FacebookTM profiles). Gender was also examined. Overall, participants disclosed more information when constructing a profile for another person when using a hard copy paper and pencil format than an online context. Gender differences were not uniform across media contexts, however, in contrast to traditional disclosure theory, females censored their disclosures more so than males but only for some topics. Only 20% of the sample increased their use of privacy settings. Consistent with patterns of disclosure, descriptive comparison suggests that more settings were employed in the paper and pencil than online context and more privacy settings were employed by females.
文摘In this paper, we propose an incremental method of Granular Networks (GN) to construct conceptual and computational platform of Granular Computing (GrC). The essence of this network is to describe the associations between information granules including fuzzy sets formed both in the input and output spaces. The context within which such relationships are being formed is established by the system developer. Here information granules are built using Context-driven Fuzzy Clustering (CFC). This clustering develops clusters by preserving the homogeneity of the clustered patterns associated with the input and output space. The experimental results on well-known software module of Medical Imaging System (MIS) revealed that the incremental granular network showed a good performance in comparison to other previous literature.