Premium
Special Issue on Applications and Techniques in Cyber Intelligence Concurrency and Computation: Practice and Experience
Author(s) -
Xu Zheng,
Zhou Qingyuan
Publication year - 2019
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.5274
Subject(s) - word2vec , computer science , concurrency , tf–idf , service (business) , data science , artificial intelligence , distributed computing , physics , economy , embedding , quantum mechanics , term (time) , economics
This special issue focuses on all aspects on techniques and applications in cyber intelligence research. The purpose of this special issue is to provide a forum for presentation and discussion of innovative ideas, cutting-edge research results, and novel techniques, methods, and applications on all aspects of cyber intelligence. It includes selected papers from the 2018 International Conference on Applications and Techniques in Cyber Intelligence (ATCI2018) July 11-13, 2018, Shanghai, China, as well as an open call. The submitted manuscripts were reviewed by experts from both academia and industry. After two rounds of reviewing, the ten highest quality manuscripts were suggested for the editor in chief to accept for this special issue. This special issue will be published by Concurrency and Computation: Practice and Experience (CCPE) as special issues. A kind of cutting and nesting system for cloud manufacturing based on service-oriented architecture (SOA) is proposed by Li and Wang1, which deploys a nesting algorithm distributedly to a multicore computer cluster to provide the cutting and nesting service for numerous small and medium enterprises through uniform network service and to realize the integration with an existing enterprise system based on SOA. Wang and Zhu2 propose an improved term frequency-inverse document frequency (TFIDF) model combined with the Word2vec model for weighing word vectors. In view of the inability of the Word2vec model to distinguish the importance of words with the text, TFIDF is further introduced to weighing Word2vec word vectors to achieve a weighted Word2vec classification model. To ensure the navigational safety of ships in the sea and reduce human errors, a set of navigational information systems with decision support function is developed by Liu et al.3 A supervised learning framework with strong expansibility is established by Jia and Yang4 for search-engine joint ranking problem. It can transform existing algorithms into corresponding learning algorithms, and design new algorithms under this framework. Jiang et al5 present the game model in the social network environment by analyzing the decision-making process of conflict events and the factors to describe the evolution of conflict events. The interaction design of a driver communication system is studied by Zhao and Lin.6 They carried out three driving simulation experiments to study three different ways of interaction interfaces and then promoted a questionnaire based on NASA Text Load Index to understand the subjective feelings and subjective workload of drivers in using these interaction interfaces. Xiaoyan7 does the research on the mechanism of government subsidies and carbon tax influence on producers' decision-making by establishing an evolutionary game model between governments and producers and by integrating with prospect theory. Hu and Liu8 propose an E-maintenance framework for public infrastructure, combining Building Information Modeling, Industry Foundation Classes, and Semantic Web technologies to help integrate heterogeneous data and expert knowledge, enable information sharing through the whole life cycle, and support maintenance managers to make effective maintenance decisions. Darabian et al9 use sequential pattern mining technique to detect most frequent opcode sequences of malicious Internet of things applications. Qiu et al10 prove that the local diagnosability of a matching composition network can be obtained by adding one to that of the component with some structural restrictions.