电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.115014
Linli Wang, Hu Wang, Hanlu Lei
{"title":"Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN","authors":"Linli Wang, Hu Wang, Hanlu Lei","doi":"10.4236/jcc.2023.115014","DOIUrl":"https://doi.org/10.4236/jcc.2023.115014","url":null,"abstract":"At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70937050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.117005
M. Ferdous, M. Anwar
{"title":"Identification of Influential Users in Online Social Network: A Brief Overview","authors":"M. Ferdous, M. Anwar","doi":"10.4236/jcc.2023.117005","DOIUrl":"https://doi.org/10.4236/jcc.2023.117005","url":null,"abstract":"Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote both new and viral applications as well as disseminate information. Social network analysis is the study of these information networks that leads to uncovering patterns of interaction among the entities. In this regard, finding influential users in OSNs is very important as they play a key role in the success above phenomena. Various approaches exist to detect influential users in OSNs, starting from simply counting the immediate neighbors to more complex machine-learning and message-passing techniques. In this paper, we review the recent existing research works that focused on identifying influential users in OSNs.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70938012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.117006
Sarah Nyanjara, D. Machuve, P. Nykanen
{"title":"Indicator Selection for Quality Measurement in Maternal Neonatal and Child Health Services: Application of Random Forest Classifier","authors":"Sarah Nyanjara, D. Machuve, P. Nykanen","doi":"10.4236/jcc.2023.117006","DOIUrl":"https://doi.org/10.4236/jcc.2023.117006","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70938715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.118002
Prattana Deeprasertkul, Kanoksri Sarinnapakorn
{"title":"A Water Level Forecast of Pattani River in the Southern of Thailand by Deep Learning","authors":"Prattana Deeprasertkul, Kanoksri Sarinnapakorn","doi":"10.4236/jcc.2023.118002","DOIUrl":"https://doi.org/10.4236/jcc.2023.118002","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70939091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.1110003
Sai Madhur Potturu
{"title":"A360 Bot Framework: Empowering Smart Robotic Process Automation Solutions","authors":"Sai Madhur Potturu","doi":"10.4236/jcc.2023.1110003","DOIUrl":"https://doi.org/10.4236/jcc.2023.1110003","url":null,"abstract":"This research paper explores the significance of the “A360 Bot Framework” in Automation 360 (A360) platform. A360 is Automation Anywhere’s cloud-based automation platform designed to make business processes more efficient. It’s known for its user-friendly interface, which allows both technical and non-technical users to use it effectively. Automation 360 is versatile, offering a range of tools to automate tasks, manage complex workflows, and integrate various applications. It empowers users to create customized solutions for their specific needs. Being cloud-based it ensures scalability, security, and real-time updates, making it a top choice in the fast-paced digital world. As demand for A360 rises, having a structured way to develop bots becomes crucial. The paper introduces the “A360 Bot Framework” as a guiding approach for bot developments. This framework ensures consistency and scalability, especially when working with both professional developers and non-technical users. It outlines key elements like setting up work folders, managing logs, dealing with errors, and ensuring secure bot execution. Ultimately, the “A360 Bot Framework” is presented as a foundational structure that enhances consistency, resiliency, and development efficiency. By following predefined practices and templates, bot developers can mitigate risks and streamline debugging processes. This framework accelerates the bot development lifecycle, allowing developers to focus on specific functionalities and value-added features. The research paper aims to provide insights into the benefits of adopting the A360 Bot Framework and its potential to revolutionize A360 bot development practices, leading to more efficient and effective automation solutions.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135156111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-Based Certificate Authentication System with Enabling Correction","authors":"Md. Mijanur Rahman, Md. Tanzinul Kabir Tonmoy, Saifur Rahman Shihab, Riya Farhana","doi":"10.4236/jcc.2023.113006","DOIUrl":"https://doi.org/10.4236/jcc.2023.113006","url":null,"abstract":"Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range of applications, from financial services and supply chain management to voting systems and identity verification. An organization must verify its candidates before selecting them. Choosing an unqualified candidate can ruin an organization’s reputation. In this paper, a blockchain-based academic certificate authentication system will be used to ensure authenticity and make the assertion of the decentralized system secure. However, the system will generate, authenticate and make corrections on academic certificates. Ultimately, some blockchain-based authentication systems already exist, they can’t correct any errors that occur during generation. A blockchain-based certificate authentication system was built using blockchain technology. Where admin could generate, authenticate and correct the certificate if necessary. The admin can also check how many times a certificate has been modified. Other users can only check the authenticity of the certificates. We’re using two blockchains to enable corrections. Blockchain technology can successfully implement a certificate authentication system. This system will eliminate doubts about the authenticity of certificates, provide fast responses, and ensure reliable and secure storage. The proposed system will help in many ways, such as providing a user-friendly university admission, and smooth job hiring process, etc. In conclusion, our proposed system can permanently eradicate certificate forgeries and create and promote trust in society.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135585548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.112010
Eric Michel Deussom Djomadji, Kabiena Ivan Basile, Tchapga Tchito Christian, F. Djoko, M. E. Sone
{"title":"Machine Learning-Based Approach for Identification of SIM Box Bypass Fraud in a Telecom Network Based on CDR Analysis: Case of a Fixed and Mobile Operator in Cameroon","authors":"Eric Michel Deussom Djomadji, Kabiena Ivan Basile, Tchapga Tchito Christian, F. Djoko, M. E. Sone","doi":"10.4236/jcc.2023.112010","DOIUrl":"https://doi.org/10.4236/jcc.2023.112010","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.112008
Yiqiao Lin, Xueyan Jiao, Lei Zhao
{"title":"Detection of 3D Human Posture Based on Improved Mediapipe","authors":"Yiqiao Lin, Xueyan Jiao, Lei Zhao","doi":"10.4236/jcc.2023.112008","DOIUrl":"https://doi.org/10.4236/jcc.2023.112008","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.112009
Deussom Djomadji Eric Michel, Takembo Ntahkie Clovis, Tchapga Tchito Christian, A. Mohamadou, M. E. Sone
{"title":"Machine Learning-Based Alarms Classification and Correlation in an SDH/WDM Optical Network to Improve Network Maintenance","authors":"Deussom Djomadji Eric Michel, Takembo Ntahkie Clovis, Tchapga Tchito Christian, A. Mohamadou, M. E. Sone","doi":"10.4236/jcc.2023.112009","DOIUrl":"https://doi.org/10.4236/jcc.2023.112009","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}