cross platform
Recently Published Documents


TOTAL DOCUMENTS

2080
(FIVE YEARS 726)

H-INDEX

52
(FIVE YEARS 10)

2022 ◽  
Vol 16 (2) ◽  
pp. 1-18
Author(s):  
Xueyuan Wang ◽  
Hongpo Zhang ◽  
Zongmin Wang ◽  
Yaqiong Qiao ◽  
Jiangtao Ma ◽  
...  

Cross-network anchor link discovery is an important research problem and has many applications in heterogeneous social network. Existing schemes of cross-network anchor link discovery can provide reasonable link discovery results, but the quality of these results depends on the features of the platform. Therefore, there is no theoretical guarantee to the stability. This article employs user embedding feature to model the relationship between cross-platform accounts, that is, the more similar the user embedding features are, the more similar the two accounts are. The similarity of user embedding features is determined by the distance of the user features in the latent space. Based on the user embedding features, this article proposes an embedding representation-based method Con&Net(Content and Network) to solve cross-network anchor link discovery problem. Con&Net combines the user’s profile features, user-generated content (UGC) features, and user’s social structure features to measure the similarity of two user accounts. Con&Net first trains the user’s profile features to get profile embedding. Then it trains the network structure of the nodes to get structure embedding. It connects the two features through vector concatenating, and calculates the cosine similarity of the vector based on the embedding vector. This cosine similarity is used to measure the similarity of the user accounts. Finally, Con&Net predicts the link based on similarity for account pairs across the two networks. A large number of experiments in Sina Weibo and Twitter networks show that the proposed method Con&Net is better than state-of-the-art method. The area under the curve (AUC) value of the receiver operating characteristic (ROC) curve predicted by the anchor link is 11% higher than the baseline method, and Precision@30 is 25% higher than the baseline method.


2022 ◽  
Vol 16 (1) ◽  
pp. 54
Author(s):  
Imam Husni Al amin ◽  
Awan Aprilino

Currently, vehicle number plate detection systems in general still use the manual method. This will take a lot of time and human effort. Thus, an automatic vehicle number plate detection system is needed because the number of vehicles that continues to increase will burden human labor. In addition, the methods used for vehicle number plate detection still have low accuracy because they depend on the characteristics of the object being used. This study develops a YOLO-based automatic vehicle number plate detection system. The dataset used is a pretrained YOLOv3 model of 700 data. Then proceed with the number plate text extraction process using the Tesseract Optical Character Recognition (OCR) library and the results obtained will be stored in the database. This system is web-based and API so that it can be used online and on the cross-platform. The test results show that the automatic number plate detection system reaches 100% accuracy with sufficient lighting and a threshold of 0.5 and for the results using the Tesseract library, the detection results are 92.32% where the system is successful in recognizing all characters on the license plates of cars and motorcycles. in the form of Alphanumeric characters of 7-8 characters.


2022 ◽  
Vol 16 (2) ◽  
pp. 94-104
Author(s):  
A. D. Zaikin ◽  
I. I. Suhanov

The physics laboratory-works creating and operating computer simulations experience is described. A significant amount of laboratory works can be classified as a “black box”. The studied physical phenomenon is hidden from direct observation, the control is carried out by means of electrical measuring devices. It is difficult to distinguish physical reality from its imitation when performing such work, so the virtualization of this one does not require realistic images. The schematic representation of the laboratory installation greatly simplifies the process of creating a simulator. A unique set of installation parameters is formed for each student performing laboratory work on the simulator, which contributes to the independence of the student's work. These parameters are stored in Google Sheets. Their transfer to the laboratory work’s html-template is carried out in encrypted form through the Google Apps Script service. Virtual laboratory work is implemented as a cross-platform web application.


2022 ◽  
pp. 214-234
Author(s):  
Heru Susanto ◽  
Nurul Mardhiah ◽  
Alifya Kayla Shafa Susanto

In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.


2022 ◽  
Author(s):  
Andreas Biørn-Hansen ◽  
Tor-Morten Grønli ◽  
Tim A. Majchrzak ◽  
Hermann Kaindl ◽  
Gheorghita Ghinea
Keyword(s):  

2022 ◽  
pp. 1683-1700
Author(s):  
Liliana Maria Favre

New paradigms such as pervasive computing, cloud computing, and the internet of things (IoT) are impacting the business world. Smartphones are at the core of these paradigms by allowing us interaction with the world around us. In light of this, it is imperative to migrate a lot of existing non-mobile software to adapt it to the new technological reality. The main challenge to achieve this goal is the proliferation of mobile platforms. An integration of ADM (Architecture Driven Modernization), cross-platform development and formal metamodeling to face this kind of migration is described. The proposal was validated with the migration of object-oriented software to different mobile platforms through the multiplatform language Haxe. A comparison of the approach with traditional migration processes and the description of existing challenges in real projects of the scientific and industrial field are included.


2022 ◽  
pp. 102879
Author(s):  
Rong Gu ◽  
Jun Shi ◽  
Xiaofei Chen ◽  
Zhaokang Wang ◽  
Yang Che ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document