![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessModeling of distortional hardening including plane strain tension and pure shear for a TWIP steel
This paper focuses on calibrating and modeling of distortional hardening behaviours in twinning induced plasticity steels. True stress-strain curves for uniaxial tension, plane strain tension, and pure shear s...
-
Article
The extraction method of new logining word/term for social media based on statistics and N-increment
New logining word/terms are reasonably extracted to improve the accuracy of information retrieval and to provide the theoretical support for tracking network topics and social public opinion. To efficiently mi...
-
Article
Joint entity and relation extraction model based on directed-relation GAT oriented to Chinese patent texts
The joint extraction task aims to construct an entity-relation triple comprising two entities and the relation between them. Existing joint models make it difficult to process too many overlap** relations in...
-
Article
Hardware Spiking Neural Networks with Pair-Based STDP Using Stochastic Computing
Spiking Neural Networks (SNNs) can closely mimic the biological neural network systems. Recently, the SNNs have been developed in hardware circuits to emulate the time encoding and information-processing aspec...
-
Article
Fast algorithm for Joseph’s forward projection in iterative computed tomography reconstruction
In computed tomography, iterative methods perform better than conventional analytical methods when reconstructing from sparse, insufficient or noisy data. Siddon’s forward projection has been widely used in it...
-
Article
NMEAS: Neuro-MaxEnt architecture search
Fusion operations are widely used in many hand-crafted convolutional neural network model to reduce parameter number and improve feature learning, however, most neural architecture search methods suffered from...
-
Article
Iterative image reconstruction based on Köhler’s forward projection
Iterative reconstruction methods outperform analytical methods when dealing with incomplete or noisy projection data. In iterative reconstruction, forward projection and backprojection are two major operations...
-
Article
Open AccessThe CTCN-LightGBM Joint Model for Industrial Balanced Loading Prediction
Balanced industrial loading mainly relies on accurate multi-adjustment values, including the truck speed and chute flow. However, the existing models are weak in real-time loading prediction because the single...
-
Chapter and Conference Paper
LDM: A Location Detection Method of Emotional Adversarial Samples Attack for Emotion-Cause Pair Extraction
ECPE as the task of extracting emotion-cause pairs provides technical support for some fields, such as public opinion analysis. The existing ECPE methods are attacked by emotional adversarial samples, the prec...
-
Chapter and Conference Paper
Research on Aspect Extraction for Chinese Commodities Reviews
In the field of aspect extraction of Chinese reviews on commodities, the static word vector obtained by traditional word embedding cannot represent polysemy, resulting in low accuracy of aspect extraction. To ...
-
Chapter and Conference Paper
AS-GSI: Aspect-Level Sentiment Analysis Integrating Global Semantic Information
The purpose of aspect-level sentiment analysis is to predict the sentiment polarity of a given aspect in context. At present, most of the existing models use the attention mechanism to capture sentiment inform...
-
Article
Causality extraction model based on two-stage GCN
As one of the indirect causality, cascaded causality can be used to construct the event knowledge graph, causal inference, scenario analysis, etc. The existing GCN methods lack the mining of context informatio...
-
Article
Real-Time Detection Network SI-SSD for Weak Targets in Complex Traffic Scenarios
In recent years, the sharp increase in the number of residential motor vehicles and non-motorized vehicles has led to a huge challenge in the intelligent control of urban road traffic operation status. To addr...
-
Chapter and Conference Paper
Research on Data Analysis and Electronic Forensics Algorithm of Telecom Fraud Activity
This paper aims to provide effective and complete electronic evidence of telecom fraud activity for public safety agency. We proposed telecom fraud activity computer forensics platform architecture based on th...
-
Chapter and Conference Paper
SFC Based Cost-Aware Dynamic Multi-domain Service Deployment
Network Function Virtualization (NFV) achieves flexible service provisioning by Service Function Chain (SFC). Nowadays, it is difficult to adapt to users’ dynamic service requests in multi-domain scenarios, si...
-
Chapter and Conference Paper
Application of Mass Data Retrieval Technology Based on Cloud Computing
As an emerging computing model, cloud computing has developed rapidly in recent years due to its convenient management, low cost, dynamic growth of storage space and no need to purchase storage equipment. The ...
-
Chapter and Conference Paper
Bearing Fault Diagnosis Method of Bearing Based on LSTM Auto-Encoder
Aiming at the problem that the signal features of rolling bearing fault diagnosis need to be extracted and selected manually, which affects the accuracy of fault classification, a rolling bearing fault diagnos...
-
Article
A data processing method based on sequence labeling and syntactic analysis for extracting new sentiment words from product reviews
New sentiment words in product reviews are valuable resources that are directly close to users. The data processing of new sentiment word extraction can provide information service better for users and provide...
-
Chapter and Conference Paper
Constructing Emotional Weak Labels for Online Shop** Platform Based on Product Attribute and Relevance
Based on the product review corpus, it is difficult to accurately analyze the emotional polarity of candidate emotion words without considering the domain-oriented emotional polarity weak tags. In order to sol...
-
Chapter and Conference Paper
University Education Resource Sharing Based on Blockchain and IPFS
A large number of educational resources are stored in major university databases, resources are not fully shared and resulting in waste of resources. In order to solve the above problem, a method of university...